Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S1Rv3ioghk.exe

Overview

General Information

Sample name:S1Rv3ioghk.exe
renamed because original name is a hash value
Original sample name:FD7EC2C34E2593E4D606E0A9D37E257A.exe
Analysis ID:1581258
MD5:fd7ec2c34e2593e4d606e0a9d37e257a
SHA1:aac4d5282290c1da30acbf00703c02c5e6ee4b6e
SHA256:17a742ca6bd9bd88de4f83074d17d1f74faec1b04d177bef710229c77d9e6e21
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • S1Rv3ioghk.exe (PID: 4464 cmdline: "C:\Users\user\Desktop\S1Rv3ioghk.exe" MD5: FD7EC2C34E2593E4D606E0A9D37E257A)
    • cmd.exe (PID: 6304 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ShellExperienceHosts.exe (PID: 4228 cmdline: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe MD5: 0922B22053A6D5D9516EA910D34A4771)
        • WerFault.exe (PID: 1436 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 852 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, CommandLine: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, NewProcessName: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, OriginalFileName: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6304, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe, ProcessId: 4228, ProcessName: ShellExperienceHosts.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\Public\Bulete\program\yyzyBase.dllReversingLabs: Detection: 82%
Source: S1Rv3ioghk.exeReversingLabs: Detection: 65%
Source: S1Rv3ioghk.exeVirustotal: Detection: 66%Perma Link
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D8E2D CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C6D8E2D
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D8792 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C6D8792
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D84FC CryptStringToBinaryA,CryptStringToBinaryA,___std_exception_copy,4_2_6C6D84FC
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c72f41ab-2
Source: S1Rv3ioghk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win32_VS2019_nondev_i_r\WindowsPlayer_Master_il2cpp_x86.pdb source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002B7D000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe, ShellExperienceHosts.exe, 00000004.00000000.2055889218.000000000040C000.00000002.00000001.01000000.00000005.sdmp, ShellExperienceHosts.exe.0.dr
Source: Binary string: ?COMCTL32.dllWINHTTP.dllcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAESNI_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPOLY1305_ASMLoad file into cachecrypto\x509\by_file.cunspecified certificate verification errorunable to get issuer certificateunable to get certificate CRLunable to decrypt certificate's signatureunable to decrypt CRL's signatureunable to decode issuer public keycertificate signature failureCRL signature failurecertificate is not yet validcertificate has expiredCRL is not yet validCRL has expiredformat error in certificate's notBefore fieldformat error in certificate's notAfter fieldformat error in CRL's lastUpdate fieldformat error in CRL's nextUpdate fieldout of memoryself signed certificateself signed certificate in certificate chainunable to get local issuer certificateunable to verify the first certificatecertificate chain too longcertificate revokedinvalid CA certificatepath length constraint exceededunsupported certificate purposecertificate not trustedcertificate rejectedsubject issuer mismatchauthority and subject key identifier mismatchauthority and issuer serial number mismatchkey usage does not include certificate signingunable to get CRL issuer certificateunhandled critical extensionkey usage does not include CRL signingunhandled critical CRL extensioninvalid non-CA certificate (has CA markings)proxy path length constraint exceededkey usage does not include digital signatureproxy certificates not allowed, please set the appropriate flaginvalid or inconsistent certificate extensioninvalid or inconsistent certificate policy extensionno explicit policyDifferent CRL scopeUnsupported extension featureRFC 3779 resource not subset of parent's resourcespermitted subtree violationexcluded subtree violationname constraints minimum and maximum not supportedapplication verification failureunsupported name constraint typeunsupported or invalid name constraint syntaxunsupported or invalid name syntaxCRL path validation errorPath LoopSuite B: certificate version invalidSuite B: invalid public key algorithmSuite B: invalid ECC curveSuite B: invalid signature algorithmSuite B: curve not allowed for this LOSSuite B: cannot sign P-384 with P-256Hostname mismatchEmail address mismatchIP address mismatchNo matching DANE TLSA recordsEE certificate key too weakCA certificate key too weakCA signature digest algorithm too weakInvalid certificate verification contextIssuer certificate lookup errorCertificate Transparency required, but no valid SCTs foundproxy subject name violationOCSP verification neededOCSP verification failedOCSP unknown certCertificate public key has explicit ECC parametersunknown certificate verification errorcrypto\asn1\x_info.ccrypto\pem\pem_info.cRSA P
Source: Binary string: H:\func_v12_i18n_202411_branch\Build\Release\WPSOffice\office6\addons\konlinesetup_xa\konlinesetup_xa.pdb source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAESNI_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPOLY1305_ASM source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7DC637 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,4_2_6C7DC637
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6F8625 WSAStartup,getaddrinfo,socket,connect,closesocket,socket,connect,closesocket,freeaddrinfo,recv,recv,recv,VirtualAlloc,_strlen,4_2_6C6F8625
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: http://dw-collect-debug.ksord.com)datesign_eventslocal
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: http://dw-online.ksosoft.com/api/dynamicParam/v3/app/2.9.0dcsdk_eventv3.dbdcsdk_dpv3.data10C
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: http://en.ksupdate.com/errorreport/uphttps://en.ksupdate.com/errorreport/up-crashdmp
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: http://event.4wps.nethttps://event.wps.comcountryCodeFinishTaghttps://www.google-analytics.com/mp/co
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: http://ic.wps.cn/wpsv6internet/infos.ads?v=D1S1E1&d=kdcsdk_infoc/wps/client/appcountrycodelastupdate
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0L
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: http://ocsp.sectigo.com0#
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2053011622.00000000009B0000.00000004.00001000.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr, ShellExperienceHosts.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://clients2.google.com/service/update2/crxSoftware
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://curl.se/docs/hsts.html
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://event.wps.comdynamicParamFinishTagt1_app_start_p_st_sv_app_gid_did_hdid3_aid_ut_rid_av_ch_db
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://http_.index.inicert_detailis_cached_fileverify_cert_failedKOnlineSetupImpl::__generateCacheF
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://params.wps.com/api/map/online_params/webparam_mig/onlineParamByFunc?funcName=
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://params.wps.com/api/map/online_params/webparam_mig/onlineParamByFunc?funcName=&version=&chann
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://s.wps.comshortLinkUrlshortlink/short-link/queryshort_link_code=geterr_signAuthorizationdevic
Source: S1Rv3ioghk.exe, yyzyBase.dll.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://wdl1.pcfg.cache.wpscdn.com/wpsdl/wpsoffice/onlinesetup/distsrc/.execrashdmppidtidexp1IS_WPSO
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://wdl1.pcfg.cache.wpscdn.com/wpsdl/wpsoffice/onlinesetup/package/SOFTWARE
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://website-prod.cache.wpscdn.com/pkgs/win/setup_XA_mui_Free.exeSOFTWARE
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002BCB000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://www.google-analytics.com/mp/collecthttps://http:///Iphlpapi.dllGetNetworkParamsinternal_proc
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://www.wps.com/eula
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://www.wps.com/eulaprivacy_policylicense_agreementlabelTitleMsg_Wps_OnlineSetup_TaskMsgMsg_Wps_
Source: wps_lid.lid-s8HDMqE8a6Xy.exe.0.drString found in binary or memory: https://www.wps.com/privacy-policy
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C80CDE9 __EH_prolog3,GetKeyboardState,GetKeyboardLayout,MapVirtualKeyW,ToUnicodeEx,GetAsyncKeyState,GetAsyncKeyState,GetKeyboardState,GetKeyboardLayout,MapVirtualKeyW,ToUnicodeEx,CharUpperW,4_2_6C80CDE9
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76C3CF GetKeyState,GetKeyState,GetKeyState,4_2_6C76C3CF
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D8E2D CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C6D8E2D
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D8E2D4_2_6C6D8E2D
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6FA6CF4_2_6C6FA6CF
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D87924_2_6C6D8792
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6F9B7B4_2_6C6F9B7B
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6FB7A14_2_6C6FB7A1
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C86CF404_2_6C86CF40
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6EC9CA4_2_6C6EC9CA
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6E699E4_2_6C6E699E
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C874B744_2_6C874B74
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C71854C4_2_6C71854C
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7C01E54_2_6C7C01E5
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6E622C4_2_6C6E622C
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6F9D684_2_6C6F9D68
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C749D8F4_2_6C749D8F
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6E7E5A4_2_6C6E7E5A
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6EBEEC4_2_6C6EBEEC
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C811F414_2_6C811F41
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C70B8F84_2_6C70B8F8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D99F84_2_6C6D99F8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C743A0E4_2_6C743A0E
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6F3AF04_2_6C6F3AF0
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C75BB744_2_6C75BB74
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6DB4F14_2_6C6DB4F1
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6E96D24_2_6C6E96D2
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7193CB4_2_6C7193CB
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe 41F413DEBFE785B95D852A396AEFE1C814F3C13BDEDF85526F2DC4E83127D6CA
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C701262 appears 69 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C77B4B6 appears 44 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C7C123B appears 69 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C7C0640 appears 70 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C6D421A appears 31 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C86CB06 appears 37 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: String function: 6C7C11D2 appears 237 times
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 852
Source: S1Rv3ioghk.exeStatic PE information: invalid certificate
Source: yyzyBase.dll.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: wps_lid.lid-s8HDMqE8a6Xy.exe.0.drStatic PE information: Resource name: ZIPRES type: Zip archive data, at least v1.0 to extract, compression method=store
Source: wps_lid.lid-s8HDMqE8a6Xy.exe.0.drStatic PE information: Resource name: ZIPRES type: Zip archive data, at least v1.0 to extract, compression method=store
Source: S1Rv3ioghk.exe, 00000000.00000000.2041809822.0000000000442000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEasiNote.dll6 vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000000.2041809822.0000000000442000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameosprovision.exe` vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000003.2053330949.0000000003A10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekonlinesetup_xa.exe6 vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000002.2056610072.0000000000736000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAOKAISB.exe< vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekonlinesetup_xa.exe6 vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000003.2042738704.0000000002521000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEasiNote.dll6 vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exe, 00000000.00000003.2042738704.0000000002521000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileNameosprovision.exe` vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exeBinary or memory string: OriginalFilenameEasiNote.dll6 vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exeBinary or memory string: OriginalFileNameosprovision.exe` vs S1Rv3ioghk.exe
Source: S1Rv3ioghk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ShellExperienceHosts.exe.0.drStatic PE information: Section: .tp6 ZLIB complexity 1.000637755102041
Source: classification engineClassification label: mal60.evad.winEXE@7/10@0/0
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C70E9A5 __EH_prolog3_GS,GetDiskFreeSpaceW,GetFullPathNameW,GetFileTime,SetFileTime,GetFileSecurityW,GetFileSecurityW,SetFileSecurityW,4_2_6C70E9A5
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6F9B7B CreateToolhelp32Snapshot,Process32FirstW,WideCharToMultiByte,_strlen,Process32NextW,CloseHandle,CloseHandle,SHGetFolderPathA,_strlen,DeleteFileA,4_2_6C6F9B7B
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6FABEF GetFileAttributesA,CoInitialize,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,CoUninitialize,4_2_6C6FABEF
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C720D0E FindResourceW,LoadResource,LockResource,SizeofResource,SysAllocStringLen,4_2_6C720D0E
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile created: C:\Users\Public\BuleteJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:432:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4228
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\659d486c-a0d5-4a62-a59f-e6d7b1b1d752Jump to behavior
Source: S1Rv3ioghk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: S1Rv3ioghk.exeReversingLabs: Detection: 65%
Source: S1Rv3ioghk.exeVirustotal: Detection: 66%
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile read: C:\Users\user\Desktop\S1Rv3ioghk.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\S1Rv3ioghk.exe "C:\Users\user\Desktop\S1Rv3ioghk.exe"
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 852
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe C:\Users\Public\Bulete\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: yyzybase.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: wps_lid.lid-s8HDMqE8a6Xy.exe.lnk.4.drLNK file: ..\..\Public\Bulete\wps_lid.lid-s8HDMqE8a6Xy.exe
Source: S1Rv3ioghk.exeStatic file information: File size 4477216 > 1048576
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win32_VS2019_nondev_i_r\WindowsPlayer_Master_il2cpp_x86.pdb source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002B7D000.00000004.00000020.00020000.00000000.sdmp, ShellExperienceHosts.exe, ShellExperienceHosts.exe, 00000004.00000000.2055889218.000000000040C000.00000002.00000001.01000000.00000005.sdmp, ShellExperienceHosts.exe.0.dr
Source: Binary string: ?COMCTL32.dllWINHTTP.dllcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAESNI_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPOLY1305_ASMLoad file into cachecrypto\x509\by_file.cunspecified certificate verification errorunable to get issuer certificateunable to get certificate CRLunable to decrypt certificate's signatureunable to decrypt CRL's signatureunable to decode issuer public keycertificate signature failureCRL signature failurecertificate is not yet validcertificate has expiredCRL is not yet validCRL has expiredformat error in certificate's notBefore fieldformat error in certificate's notAfter fieldformat error in CRL's lastUpdate fieldformat error in CRL's nextUpdate fieldout of memoryself signed certificateself signed certificate in certificate chainunable to get local issuer certificateunable to verify the first certificatecertificate chain too longcertificate revokedinvalid CA certificatepath length constraint exceededunsupported certificate purposecertificate not trustedcertificate rejectedsubject issuer mismatchauthority and subject key identifier mismatchauthority and issuer serial number mismatchkey usage does not include certificate signingunable to get CRL issuer certificateunhandled critical extensionkey usage does not include CRL signingunhandled critical CRL extensioninvalid non-CA certificate (has CA markings)proxy path length constraint exceededkey usage does not include digital signatureproxy certificates not allowed, please set the appropriate flaginvalid or inconsistent certificate extensioninvalid or inconsistent certificate policy extensionno explicit policyDifferent CRL scopeUnsupported extension featureRFC 3779 resource not subset of parent's resourcespermitted subtree violationexcluded subtree violationname constraints minimum and maximum not supportedapplication verification failureunsupported name constraint typeunsupported or invalid name constraint syntaxunsupported or invalid name syntaxCRL path validation errorPath LoopSuite B: certificate version invalidSuite B: invalid public key algorithmSuite B: invalid ECC curveSuite B: invalid signature algorithmSuite B: curve not allowed for this LOSSuite B: cannot sign P-384 with P-256Hostname mismatchEmail address mismatchIP address mismatchNo matching DANE TLSA recordsEE certificate key too weakCA certificate key too weakCA signature digest algorithm too weakInvalid certificate verification contextIssuer certificate lookup errorCertificate Transparency required, but no valid SCTs foundproxy subject name violationOCSP verification neededOCSP verification failedOCSP unknown certCertificate public key has explicit ECC parametersunknown certificate verification errorcrypto\asn1\x_info.ccrypto\pem\pem_info.cRSA P
Source: Binary string: H:\func_v12_i18n_202411_branch\Build\Release\WPSOffice\office6\addons\konlinesetup_xa\konlinesetup_xa.pdb source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -FS -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAESNI_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPOLY1305_ASM source: S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.dr
Source: initial sampleStatic PE information: section where entry point is pointing to: .tp6d
Source: S1Rv3ioghk.exeStatic PE information: real checksum: 0x69041 should be: 0x44b1e8
Source: yyzyBase.dll.0.drStatic PE information: real checksum: 0x3b14ca should be: 0x3bb6cb
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6a
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6d
Source: yyzyBase.dll.0.drStatic PE information: section name: .00cfg
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7C12AA push ecx; ret 4_2_6C7C12BD
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6 entropy: 7.9916235972250025
Source: ShellExperienceHosts.exe.0.drStatic PE information: section name: .tp6d entropy: 7.90195668192099
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile created: C:\Users\Public\Bulete\program\yyzyBase.dllJump to dropped file
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile created: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeJump to dropped file
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeFile created: C:\Users\Public\Bulete\wps_lid.lid-s8HDMqE8a6Xy.exeJump to dropped file
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76CCDF IsWindowVisible,IsWindowVisible,GetWindowRect,IsIconic,CopyRect,MonitorFromPoint,GetMonitorInfoW,CopyRect,CopyRect,SystemParametersInfoW,OffsetRect,GetSystemMetrics,GetSystemMetrics,4_2_6C76CCDF
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C712E3D SetForegroundWindow,IsIconic,PostMessageW,IsIconic,4_2_6C712E3D
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C712E3D SetForegroundWindow,IsIconic,PostMessageW,IsIconic,4_2_6C712E3D
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C710BFE IsIconic,4_2_6C710BFE
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76B422 GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,SaferiSearchMatchingHashRules,4_2_6C76B422
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C763428 IsWindowVisible,IsIconic,4_2_6C763428
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76D4B8 IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C76D4B8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76D4B8 IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C76D4B8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76D4B8 IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,4_2_6C76D4B8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76D5D3 IsWindowVisible,ScreenToClient,IsIconic,GetSystemMetrics,PtInRect,PtInRect,GetSystemMetrics,PtInRect,4_2_6C76D5D3
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76B6ED IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,4_2_6C76B6ED
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6FF7F4 IsIconic,GetClientRect,4_2_6C6FF7F4
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C76D7DC IsIconic,PostMessageW,4_2_6C76D7DC
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeDropped PE file which has not been started: C:\Users\Public\Bulete\wps_lid.lid-s8HDMqE8a6Xy.exeJump to dropped file
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeAPI coverage: 2.3 %
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe TID: 1848Thread sleep time: -73000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeLast function: Thread delayed
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7DC637 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,4_2_6C7DC637
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeThread delayed: delay time: 73000Jump to behavior
Source: S1Rv3ioghk.exeBinary or memory string: Hyper-V enabled!UEFI Secure Variables (VbsPolicy)
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: S1Rv3ioghk.exeBinary or memory string: Hyper-V not available
Source: S1Rv3ioghk.exeBinary or memory string: Hyper-V Hypervisor running: %i
Source: S1Rv3ioghk.exeBinary or memory string: XThe system has not the required hardware support (SLAT, VMX, ...) to run the Hypervisor.#Hyper-V hypervisor is not running.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: S1Rv3ioghk.exeBinary or memory string: Hyper-V not started
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_004A152F LdrInitializeThunk,4_2_004A152F
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7BEEF7 IsDebuggerPresent,OutputDebugStringW,4_2_6C7BEEF7
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C702FB6 OutputDebugStringA,GetLastError,4_2_6C702FB6
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C6D287A GetProcessHeap,4_2_6C6D287A
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7C0526 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C7C0526
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C87C288 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C87C288
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7ED34B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6C7ED34B
Source: C:\Users\user\Desktop\S1Rv3ioghk.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bulete\program\ShellExperienceHosts.exe C:\Users\Public\Bulete\program\ShellExperienceHosts.exeJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoW,4_2_6C7C2B58
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C8904C8
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_6C8905BA
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C890513
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C8906C0
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C8900A6
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C88602B
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_6C890141
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: EnumSystemLocalesW,4_2_6C890394
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C8903F3
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_6C88FE55
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: GetLocaleInfoW,4_2_6C885A0C
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C87D26F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,4_2_6C87D26F
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C8862A6 GetTimeZoneInformation,4_2_6C8862A6
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeCode function: 4_2_6C7FC456 __EH_prolog3_GS,GetVersionExW,CoInitializeEx,CoCreateInstance,4_2_6C7FC456
Source: C:\Users\Public\Bulete\program\ShellExperienceHosts.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory151
Security Software Discovery
Remote Desktop Protocol12
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Software Packing
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1581258 Sample: S1Rv3ioghk.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 60 25 Multi AV Scanner detection for dropped file 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Sigma detected: Execution from Suspicious Folder 2->29 8 S1Rv3ioghk.exe 9 2->8         started        process3 file4 19 C:\Users\...\wps_lid.lid-s8HDMqE8a6Xy.exe, PE32 8->19 dropped 21 C:\Users\Public\Bulete\program\yyzyBase.dll, PE32 8->21 dropped 23 C:\Users\Public\...\ShellExperienceHosts.exe, PE32 8->23 dropped 11 cmd.exe 1 8->11         started        process5 process6 13 ShellExperienceHosts.exe 2 11->13         started        15 conhost.exe 11->15         started        process7 17 WerFault.exe 19 16 13->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
S1Rv3ioghk.exe66%ReversingLabsWin32.Trojan.DllHijack
S1Rv3ioghk.exe67%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\Public\Bulete\program\ShellExperienceHosts.exe0%ReversingLabs
C:\Users\Public\Bulete\program\yyzyBase.dll83%ReversingLabsWin32.Trojan.DllHijack
C:\Users\Public\Bulete\wps_lid.lid-s8HDMqE8a6Xy.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://http_.index.inicert_detailis_cached_fileverify_cert_failedKOnlineSetupImpl::__generateCacheF0%Avira URL Cloudsafe
http://dw-collect-debug.ksord.com)datesign_eventslocal0%Avira URL Cloudsafe
https://event.wps.comdynamicParamFinishTagt1_app_start_p_st_sv_app_gid_did_hdid3_aid_ut_rid_av_ch_db0%Avira URL Cloudsafe
http://ocsp.sectigo.com0#0%Avira URL Cloudsafe
https://s.wps.comshortLinkUrlshortlink/short-link/queryshort_link_code=geterr_signAuthorizationdevic0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.wps.com/eulaS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
    high
    https://sectigo.com/CPS0S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
      high
      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
        high
        http://ocsp.sectigo.com0S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
          high
          https://curl.se/docs/http-cookies.htmlS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
            high
            https://event.wps.comdynamicParamFinishTagt1_app_start_p_st_sv_app_gid_did_hdid3_aid_ut_rid_av_ch_dbS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
              high
              https://params.wps.com/api/map/online_params/webparam_mig/onlineParamByFunc?funcName=&version=&channS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                high
                http://dw-collect-debug.ksord.com)datesign_eventslocalS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                • Avira URL Cloud: safe
                unknown
                http://upx.sf.netAmcache.hve.7.drfalse
                  high
                  https://http_.index.inicert_detailis_cached_fileverify_cert_failedKOnlineSetupImpl::__generateCacheFS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://s.wps.comshortLinkUrlshortlink/short-link/queryshort_link_code=geterr_signAuthorizationdevicS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.wps.com/privacy-policywps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                    high
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
                      high
                      https://curl.se/docs/alt-svc.htmlS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                        high
                        http://ocsp.sectigo.com0#S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://wdl1.pcfg.cache.wpscdn.com/wpsdl/wpsoffice/onlinesetup/package/SOFTWARES1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                          high
                          https://curl.se/docs/hsts.htmlS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                            high
                            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tS1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
                              high
                              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yS1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
                                high
                                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#S1Rv3ioghk.exe, yyzyBase.dll.0.drfalse
                                  high
                                  http://dw-online.ksosoft.com/api/dynamicParam/v3/app/2.9.0dcsdk_eventv3.dbdcsdk_dpv3.data10CS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                    high
                                    http://ic.wps.cn/wpsv6internet/infos.ads?v=D1S1E1&d=kdcsdk_infoc/wps/client/appcountrycodelastupdateS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                      high
                                      http://en.ksupdate.com/errorreport/uphttps://en.ksupdate.com/errorreport/up-crashdmpS1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                        high
                                        https://www.wps.com/eulaprivacy_policylicense_agreementlabelTitleMsg_Wps_OnlineSetup_TaskMsgMsg_Wps_S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                          high
                                          https://params.wps.com/api/map/online_params/webparam_mig/onlineParamByFunc?funcName=S1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                            high
                                            https://website-prod.cache.wpscdn.com/pkgs/win/setup_XA_mui_Free.exeSOFTWARES1Rv3ioghk.exe, 00000000.00000003.2050804916.0000000002F57000.00000004.00000020.00020000.00000000.sdmp, wps_lid.lid-s8HDMqE8a6Xy.exe.0.drfalse
                                              high
                                              No contacted IP infos
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1581258
                                              Start date and time:2024-12-27 09:11:49 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 6m 7s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:11
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:S1Rv3ioghk.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:FD7EC2C34E2593E4D606E0A9D37E257A.exe
                                              Detection:MAL
                                              Classification:mal60.evad.winEXE@7/10@0/0
                                              EGA Information:
                                              • Successful, ratio: 50%
                                              HCA Information:
                                              • Successful, ratio: 91%
                                              • Number of executed functions: 36
                                              • Number of non-executed functions: 314
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.190.181.5, 40.126.53.9, 40.126.53.7, 40.126.53.10, 20.231.128.65, 20.231.128.66, 40.126.53.19, 20.190.181.1, 52.182.143.212, 4.245.163.56, 13.107.246.63
                                              • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                              • Execution Graph export aborted for target S1Rv3ioghk.exe, PID 4464 because there are no executed function
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              03:12:42API Interceptor1x Sleep call for process: ShellExperienceHosts.exe modified
                                              03:13:10API Interceptor1x Sleep call for process: WerFault.exe modified
                                              No context
                                              No context
                                              No context
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\Public\Bulete\program\ShellExperienceHosts.exeTEKujpTgCK.exeGet hashmaliciousUnknownBrowse
                                                TEKujpTgCK.exeGet hashmaliciousUnknownBrowse
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.987482460062348
                                                  Encrypted:false
                                                  SSDEEP:192:/YzuLn0BU/oj4+ZrFpuzuiFdOZ24IO8m:QzuL0BU/ojwzuiFdOY4IO8m
                                                  MD5:A6CBD31BC35A27049FB2C73CA828B8D2
                                                  SHA1:B7A7EE42CE20F5CABBCD684FD94087C4AADBF4C2
                                                  SHA-256:427FB044D643DE8A2BE06A94F63E50C10A8DA96A7254C65DE0499D504A4CDED0
                                                  SHA-512:3CAEF9540CC61D6B2091A1877760546CB5DCAE211C74D3B242D229A1D4AC73BC0C051D6761015718642BAD0DFCA57F8C0CFBC0DAEF360956C41517470B217363
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.7.6.0.7.6.3.5.9.4.6.4.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.7.6.0.7.6.4.0.4.7.7.6.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.7.b.7.4.f.b.-.7.d.c.d.-.4.d.5.3.-.a.1.6.0.-.0.0.3.2.4.a.d.f.f.8.0.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.8.5.2.3.2.c.2.-.b.b.3.f.-.4.9.c.2.-.b.8.e.d.-.6.0.0.e.d.2.0.f.7.0.6.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.h.e.l.l.E.x.p.e.r.i.e.n.c.e.H.o.s.t.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.8.4.-.0.0.0.1.-.0.0.1.4.-.9.2.0.6.-.f.b.1.9.3.7.5.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.c.f.c.b.3.c.8.9.5.5.4.9.d.a.1.a.b.6.8.b.3.5.e.f.d.3.1.d.2.d.5.0.0.0.0.0.9.0.4.!.0.0.0.0.7.8.4.d.3.e.d.3.5.d.0.4.0.0.9.1.a.e.2.0.9.7.9.2.e.2.f.a.8.f.c.9.7.e.e.6.a.0.7.1.!.S.h.e.l.l.E.x.p.e.r.i.e.n.c.e.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Fri Dec 27 08:12:43 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):61664
                                                  Entropy (8bit):1.8786683522054242
                                                  Encrypted:false
                                                  SSDEEP:192:BTyNrX4QZQM4CUmOhUrIyzA+W7yAfskcLM7Wi2pOaRixj7tFtOTcMbA:1y6Q2M4CUxEIk0gmaAxnFOoiA
                                                  MD5:C22AF7694FB500999E7E8DEE00D7A223
                                                  SHA1:D8445660E95DA2A43230B644A5E70BB4F93A2517
                                                  SHA-256:E4761931555B02DD48256AA9EA9AD79B3D92DF71B58DF3B3C21EA4A960C2C8ED
                                                  SHA-512:29E59C9AFF4C641913A752220C320E4DC440189175C5856F046FDA16433C60FABF29426F7B59F5D9EFC01AA218DEA2D0047D0C60F1AAC03D330F53457383EF41
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... .......{ang............$...............,............9..........T.......8...........T............$..@...........H...........4...............................................................................eJ..............GenuineIntel............T...........yang.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):6390
                                                  Entropy (8bit):3.7190354641963057
                                                  Encrypted:false
                                                  SSDEEP:96:RSIU6o7wVetbmx6DgY1QE/kM45aM4Un89bPUYsfbF9Cm:R6l7wVeJmx6DgY14prn89bMYsfbFEm
                                                  MD5:08FC333B551227010103EC656A175D2E
                                                  SHA1:8604A8A325024BE1540F2F0FE4AE19FEBDE23B8D
                                                  SHA-256:FBC5C82651686E3F6780469933EDA51D48DABFF2E990BB1EBDA4A34DD214BF44
                                                  SHA-512:295033B3E074B2F24A54119E185660AB80A446AC76FF86AEE956DDDD2627D7BAD6D08800D1891FABC3197772932DD161EF31C0AFFB8F3D569D2B11525A77B175
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.2.8.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4685
                                                  Entropy (8bit):4.4998322296935696
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsCJg77aI9yNWpW8VYpYm8M4JAtPztrFW+q8AtztBX14LKuhDUd:uIjfQI7g87VBJAtLtMBtztL4uutUd
                                                  MD5:8F33BA805A22EE360497BE393B9A78D1
                                                  SHA1:CEDD5ED56C35200D614B0CC6D4FC43D5B1014717
                                                  SHA-256:9F653D43778497AAB6513681A7379F1DC82085042CDB6177D35D86576F175609
                                                  SHA-512:0F91A40BA4F4061B3E989B86310558239D34CBD21FC67FEBEA51C4C1064BC2573E8E9C1728E049828849B647F7E96C4C65DAF5551BB5DA032850D2CE0398C2CA
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="649395" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Users\user\Desktop\S1Rv3ioghk.exe
                                                  File Type:openssl enc'd data with salted password, base64 encoded
                                                  Category:dropped
                                                  Size (bytes):64
                                                  Entropy (8bit):5.234069531114784
                                                  Encrypted:false
                                                  SSDEEP:3:iqkHHQwRS2k0OGad+FLin:ilnQwRSDnWLi
                                                  MD5:E2FA2D0BD626C372F9EFA15C317F46B1
                                                  SHA1:1CAA48FE6CA1483AE9A725E76D0D818051A72371
                                                  SHA-256:39C5EC16491E480806D170BD2A8BC2C37623E55412088ED11F21DE7D9146CA73
                                                  SHA-512:115A02EE1C1EF7A8CF2854969343813928C187DF0BB9CD1DE832236EDCBE675749C9B17C0F15E545712857FEE7B637473858076F071C94888687C381570572F1
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:U2FsdGVkX19SSgxWGselBWOCnDAwAjUSAJ8Fo8HIt6cUaOMqZptM4GJaCI/aSrXz
                                                  Process:C:\Users\user\Desktop\S1Rv3ioghk.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):649416
                                                  Entropy (8bit):6.182028963232553
                                                  Encrypted:false
                                                  SSDEEP:12288:zohLz8nnnnntnnnnnnnnnnnnnnnxnMvnnnnPZnnnnPxnnnnnnnnqshJSLnk41mCL:zshQmC5Bz5CLgBFqGI1yi/UQeZndsqro
                                                  MD5:0922B22053A6D5D9516EA910D34A4771
                                                  SHA1:784D3ED35D040091AE209792E2FA8FC97EE6A071
                                                  SHA-256:41F413DEBFE785B95D852A396AEFE1C814F3C13BDEDF85526F2DC4E83127D6CA
                                                  SHA-512:909EC8B2C1045CC11C03C6B82B7ED6AD96BC8E93F9C98CB8A668572C84CBBCE778C12365B2B2EB547218783A830BE41458E0AE21939E99339F54921D98D944D8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: TEKujpTgCK.exe, Detection: malicious, Browse
                                                  • Filename: TEKujpTgCK.exe, Detection: malicious, Browse
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.....U..U..U]..T..U]..T..U]..T..U]..T..U...T#.U...T..U...T..U...T..U..UW.U...T..U...T..U..[U..U...T..URich..U........................PE..L......d..........".......... ....../.............@.......................... ..................................................(....@...................\..............T........................... ...@............................................tp6............b.................. ..`.tp6.a..nZ.......\...f..............@..@.tp6......... ......................@..@.tp6.........@......................@..@.tp6d...5%.......&...f.............. ...................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\S1Rv3ioghk.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):3900728
                                                  Entropy (8bit):6.921777359365007
                                                  Encrypted:false
                                                  SSDEEP:98304:j9G9uqf+tQ+5ObxeayQwz10kfVtOpDLYAznM71B99gnImkJ:j9qfyixeVtqktjAznM7X9+ImkJ
                                                  MD5:E6B35BB2692E704C72FAD83DE5C86E67
                                                  SHA1:B8335960E3A92ED8C436B46FCF9D1518902D8A1B
                                                  SHA-256:48756A865554BFBBEAF25A0DDB3B16AF44F113327BA5C01A506E37F3F584D64D
                                                  SHA-512:B7B1F0528AE5DEE82C4A057A9D99F716AB24A05A2D832CD15BE3CFC738CA97FF0A31DEC3877A32F189C9554364F7B024AB27BED0B4B94DE6B9F4D7DD9FBF03D4
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 83%
                                                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...B.Qg...........!.....^...r...............................................`;.......;...@.........................H ".L.... ".......$..L............:.8.....8............................... ......M ............. -"..............................text...8\.......^.................. ..`.rdata...'...p...(...b..............@..@.data.........#..p....#.............@....00cfg.......`$.......#.............@..@.tls.........p$.......#.............@....rsrc....L....$..N....#.............@..@.reloc........8......L8.............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\S1Rv3ioghk.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):5910912
                                                  Entropy (8bit):6.969603243680094
                                                  Encrypted:false
                                                  SSDEEP:98304:O6pg+4qaSDRumxkEpMH1FkQmOnhTjqsaUODS4IeOsyrwuv/guB/k:V5IS1FnpAvHZwiO2AOsezgyk
                                                  MD5:5C8ABA9389C18C86BDD8014A0236D165
                                                  SHA1:C01D208B37F913BF0D49306A715234C8C26CCB95
                                                  SHA-256:5BDEB32D9035F87180E12AF1FB48E8DC1D921125265840A43DA067EDA31645EF
                                                  SHA-512:217881B7DF89865139D9A74584EA1B28AA952C478D5CFDA20D5744C34579EFD2C2DEB4E534AFE32EAAAC9B998D956D5B7B8CA72305F9FB78D03D7C46FCD515D0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......#..Yg..g..g..<...~..<......<...f....q.j..5...t..5...}..<...f..5......<...x..<...d..g..r.........g..............s.f..g...e......f..Richg..........PE..L....(2g.................V>..........V'......p>...@...........................Z.......Z...@...................................K.(.....L..S............Y..Q....W.H....6I.8...................@6I.....h|F.@............p>.`.....J.@....................text....T>......V>................. ..`.rdata.......p>......Z>.............@..@.data...TR...0K.......K.............@....rsrc....S....L..T....K.............@..@.reloc..H.....W......HW.............@..B................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 27 07:12:41 2024, mtime=Fri Dec 27 07:12:41 2024, atime=Thu Dec 5 08:47:57 2024, length=5910912, window=hide
                                                  Category:dropped
                                                  Size (bytes):1121
                                                  Entropy (8bit):4.718041956468457
                                                  Encrypted:false
                                                  SSDEEP:12:8psC1RUYNNlCECHqXfRnMcXXACmqyP4i8zKt4n0I6bjAUROQdStGi6yavAt4t2YS:8ps4TPy37yKY76vAURHSx6/vA/qygm
                                                  MD5:07E066F5334856CE8E1960A29A836F67
                                                  SHA1:0F2A8BC4F92FED4DBB9B58A7DC66AB8E8AF2F22B
                                                  SHA-256:88AC0D55A55A5D3DEB0BE56F6E977B667068A9D54B9AB1EA8A61AFDD2C9B168D
                                                  SHA-512:9B853AA2F5AD412BB41121B01593CC79527376301AE86E1116DFF1D4332A233647204C97FBB30D8128784708463EE5F288BEB5A61C49421F60A7780E3C112582
                                                  Malicious:false
                                                  Preview:L..................F.... ....t..7X..y...7X...xS..F...1Z..........................P.O. .:i.....+00.../C:\...................x.1.....DW(m..Users.d......OwH.Y.A....................:.....NvM.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1......Y.A..Public..f......O.I.Y.A....+...............<......h..P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1......Y.A..Bulete..>......Y.A.Y.A....8.....................'D}.B.u.l.e.t.e.......2..1Z..Y.M .WPS_LI~1.EXE..j......Y.A.Y.A....?.....................q"..w.p.s._.l.i.d...l.i.d.-.s.8.H.D.M.q.E.8.a.6.X.y...e.x.e.......b...............-.......a............+.%.....C:\Users\Public\Bulete\wps_lid.lid-s8HDMqE8a6Xy.exe..0.....\.....\.P.u.b.l.i.c.\.B.u.l.e.t.e.\.w.p.s._.l.i.d...l.i.d.-.s.8.H.D.M.q.E.8.a.6.X.y...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......124406...........hT..CrF.f4... .*z2=.b...,...W..hT..CrF.f4... .*z2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.421876653028855
                                                  Encrypted:false
                                                  SSDEEP:6144:5Svfpi6ceLP/9skLmb0OTsWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTwA:wvloTsW+EZMM6DFyD03wA
                                                  MD5:8B119C066F23D028A9EF615E0DC773AE
                                                  SHA1:4C14AF7C9CB6C41B61EF4E1FDCE0DEDC2B2725F2
                                                  SHA-256:42936232685E3A7E6FBFCFA8DBC428843190413C338CB679B19C879ECD9E78FB
                                                  SHA-512:F3367C15F725F0FC7CC3E01608D4EAC2DA9DF2E1E3F99E3BA87F93394242A86885AECDEB56F675ECF7C0918323E4A8EC45792553DD9D6DD114D6834CCD557CCE
                                                  Malicious:false
                                                  Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj...7X...............................................................................................................................................................................................................................................................................................................................................|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.931775445441287
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:S1Rv3ioghk.exe
                                                  File size:4'477'216 bytes
                                                  MD5:fd7ec2c34e2593e4d606e0a9d37e257a
                                                  SHA1:aac4d5282290c1da30acbf00703c02c5e6ee4b6e
                                                  SHA256:17a742ca6bd9bd88de4f83074d17d1f74faec1b04d177bef710229c77d9e6e21
                                                  SHA512:9cdedf8b49e2eccf54719ca8db1cf462bef874a1a5c0c5b7cb91864da3dcce2971b2318effb7c0c7d126ec26bb801e524e2c4f477087e708670970a744c3b470
                                                  SSDEEP:98304:1pe1S1L/GhYOiYjZJyY0HfyGADpjpB/t7Q/vrJpB8yG+W:1p7dOeFYjXmWZpA/vrJpKy7W
                                                  TLSH:0F2622D83394E369E6B19530E6A356F41972AD9AE920F47BD2643F0C2DB4F04A17432F
                                                  File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................h...............0....@.................................A........................................P...........,............C.8..
                                                  Icon Hash:3f43e872666cd520
                                                  Entrypoint:0x411def
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:
                                                  Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                  Signature Valid:false
                                                  Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                                  Signature Validation Error:The digital signature of the object did not verify
                                                  Error Number:-2146869232
                                                  Not Before, Not After
                                                  • 12/03/2023 20:00:00 12/03/2024 19:59:59
                                                  Subject Chain
                                                  • CN=Intel Corporation, O=Intel Corporation, S=California, C=US
                                                  Version:3
                                                  Thumbprint MD5:D33A22FCE39A6199A642B44AD0FC8B60
                                                  Thumbprint SHA-1:2F395649AEAD9175BBF761901050546E7A10AA0C
                                                  Thumbprint SHA-256:CDE983898016FC3807D26E1B770A5516C52D855BCB523705C0826B00267D58A2
                                                  Serial:00A90FA001692A0CC5CCF51B5821F2952C
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  push FFFFFFFFh
                                                  push 00414C50h
                                                  push 00411F80h
                                                  mov eax, dword ptr fs:[00000000h]
                                                  push eax
                                                  mov dword ptr fs:[00000000h], esp
                                                  sub esp, 68h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [ebp-18h], esp
                                                  xor ebx, ebx
                                                  mov dword ptr [ebp-04h], ebx
                                                  push 00000002h
                                                  call dword ptr [00413184h]
                                                  pop ecx
                                                  or dword ptr [00419924h], FFFFFFFFh
                                                  or dword ptr [00419928h], FFFFFFFFh
                                                  call dword ptr [00413188h]
                                                  mov ecx, dword ptr [0041791Ch]
                                                  mov dword ptr [eax], ecx
                                                  call dword ptr [0041318Ch]
                                                  mov ecx, dword ptr [00417918h]
                                                  mov dword ptr [eax], ecx
                                                  mov eax, dword ptr [00413190h]
                                                  mov eax, dword ptr [eax]
                                                  mov dword ptr [00419920h], eax
                                                  call 00007F35D4EF2862h
                                                  cmp dword ptr [00417710h], ebx
                                                  jne 00007F35D4EF274Eh
                                                  push 00411F78h
                                                  call dword ptr [00413194h]
                                                  pop ecx
                                                  call 00007F35D4EF2834h
                                                  push 00417048h
                                                  push 00417044h
                                                  call 00007F35D4EF281Fh
                                                  mov eax, dword ptr [00417914h]
                                                  mov dword ptr [ebp-6Ch], eax
                                                  lea eax, dword ptr [ebp-6Ch]
                                                  push eax
                                                  push dword ptr [00417910h]
                                                  lea eax, dword ptr [ebp-64h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-70h]
                                                  push eax
                                                  lea eax, dword ptr [ebp-60h]
                                                  push eax
                                                  call dword ptr [0041319Ch]
                                                  push 00417040h
                                                  push 00417000h
                                                  call 00007F35D4EF27ECh
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x52cfc.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x439fe80xb138
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x1a0000x52cfc0x52e00245e0061051191c28806833062f9d410False0.1521434294871795data4.9556234886773645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  PNG0x1c3c00x198PNG image data, 210 x 143, 4-bit colormap, non-interlacedChineseChina0.8406862745098039
                                                  RT_CURSOR0x1c5580x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"0.35714285714285715
                                                  RT_CURSOR0x1c68c0x134data0.44155844155844154
                                                  RT_CURSOR0x1c7c00x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.40584415584415584
                                                  RT_CURSOR0x1c8f40x134Targa image data 64 x 65536 x 1 +32 "\001"0.5746753246753247
                                                  RT_CURSOR0x1ca280x134AmigaOS bitmap font "(", fc_YSize 4294966287, 3840 elements, 2nd "\376\017\340\377\377\017\341\377\377\217\343\377\377\337\367\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.4642857142857143
                                                  RT_CURSOR0x1cb5c0x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.32142857142857145
                                                  RT_CURSOR0x1cc900x134data0.3409090909090909
                                                  RT_CURSOR0x1cdc40x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.4837662337662338
                                                  RT_CURSOR0x1cef80x134AmigaOS bitmap font "(", fc_YSize 4294935297, 3840 elements, 2nd "\200\003\377\201\300\007\377\203\300\017\377\003\340\037\376\007\360\037\370\017\370\003\300\037\374", 3rd0.711038961038961
                                                  RT_CURSOR0x1d02c0x134data0.6038961038961039
                                                  RT_CURSOR0x1d1600x134Targa image data 64 x 65536 x 1 +32 "\001"0.36038961038961037
                                                  RT_CURSOR0x1d2940x134Targa image data 64 x 65536 x 1 +32 "\001"0.3474025974025974
                                                  RT_CURSOR0x1d3c80x134AmigaOS bitmap font "(", fc_YSize 4294967040, 3840 elements, 2nd "\376", 3rd0.4383116883116883
                                                  RT_CURSOR0x1d4fc0x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.35064935064935066
                                                  RT_CURSOR0x1d6300x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4512987012987013
                                                  RT_CURSOR0x1d7640x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.39285714285714285
                                                  RT_CURSOR0x1d8980x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                                  RT_CURSOR0x1d9cc0x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"0.32142857142857145
                                                  RT_CURSOR0x1db000x134data0.4805194805194805
                                                  RT_CURSOR0x1dc340x134data0.38311688311688313
                                                  RT_CURSOR0x1dd680x134data0.36038961038961037
                                                  RT_CURSOR0x1de9c0x134data0.4090909090909091
                                                  RT_CURSOR0x1dfd00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                                  RT_BITMAP0x1e1040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                                  RT_BITMAP0x1e2d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                                  RT_BITMAP0x1e4a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                  RT_BITMAP0x1e6740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                                  RT_BITMAP0x1e8440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                                  RT_BITMAP0x1ea140xc0Device independent bitmap graphic, 11 x 11 x 4, image size 88RussianRussia0.40625
                                                  RT_BITMAP0x1ead40xc0Device independent bitmap graphic, 11 x 11 x 4, image size 88RussianRussia0.40625
                                                  RT_BITMAP0x1eb940xa8Device independent bitmap graphic, 10 x 8 x 4, image size 640.49404761904761907
                                                  RT_BITMAP0x1ec3c0x134Device independent bitmap graphic, 18 x 17 x 4, image size 2040.37337662337662336
                                                  RT_BITMAP0x1ed700xb8Device independent bitmap graphic, 10 x 10 x 4, image size 80RussianRussia0.41304347826086957
                                                  RT_BITMAP0x1ee280xb8Device independent bitmap graphic, 11 x 10 x 4, image size 80RussianRussia0.45652173913043476
                                                  RT_BITMAP0x1eee00xb8Device independent bitmap graphic, 10 x 10 x 4, image size 80RussianRussia0.42391304347826086
                                                  RT_BITMAP0x1ef980xb8Device independent bitmap graphic, 11 x 10 x 4, image size 80RussianRussia0.44565217391304346
                                                  RT_BITMAP0x1f0500x90Device independent bitmap graphic, 8 x 10 x 4, image size 400.4861111111111111
                                                  RT_BITMAP0x1f0e00x11cDevice independent bitmap graphic, 38 x 9 x 4, image size 1800.4507042253521127
                                                  RT_BITMAP0x1f1fc0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
                                                  RT_BITMAP0x1f2bc0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
                                                  RT_BITMAP0x1f39c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
                                                  RT_BITMAP0x1f47c0x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5285714285714286
                                                  RT_BITMAP0x1f5080xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96RussianRussia0.41
                                                  RT_BITMAP0x1f5d00xc8Device independent bitmap graphic, 12 x 12 x 4, image size 96RussianRussia0.39
                                                  RT_BITMAP0x1f6980x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.45
                                                  RT_BITMAP0x1f7240x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.25
                                                  RT_BITMAP0x1f95c0x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.20950704225352113
                                                  RT_BITMAP0x1fb940x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5071428571428571
                                                  RT_BITMAP0x1fc200x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.5142857142857142
                                                  RT_BITMAP0x1fcac0x8cDevice independent bitmap graphic, 5 x 9 x 4, image size 360.4857142857142857
                                                  RT_BITMAP0x1fd380x238Device independent bitmap graphic, 29 x 29 x 4, image size 4640.21654929577464788
                                                  RT_BITMAP0x1ff700xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.3232758620689655
                                                  RT_BITMAP0x200580xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.28448275862068967
                                                  RT_BITMAP0x201400xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.2629310344827586
                                                  RT_BITMAP0x202280xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.33189655172413796
                                                  RT_ICON0x203100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.2473404255319149
                                                  RT_ICON0x207780x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/m0.15655737704918032
                                                  RT_ICON0x211000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.12101313320825516
                                                  RT_ICON0x221a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.07655601659751038
                                                  RT_ICON0x247500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.056211620217288615
                                                  RT_ICON0x289780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 2835 x 2835 px/m0.03660395207063275
                                                  RT_ICON0x31e200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.027135336566899326
                                                  RT_ICON0x426480x1104PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9687786960514233
                                                  RT_ICON0x4374c0x2388PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced0.9195250659630607
                                                  RT_DIALOG0x45ad40xccdataEnglishUnited States0.6911764705882353
                                                  RT_DIALOG0x45ba00x1b4dataEnglishUnited States0.5458715596330275
                                                  RT_STRING0x45d540x40dataEnglishUnited States0.609375
                                                  RT_STRING0x45d940x81adataEnglishUnited States0.3322082931533269
                                                  RT_STRING0x465b00x302dataEnglishUnited States0.4649350649350649
                                                  RT_STRING0x468b40x298dataEnglishUnited States0.46536144578313254
                                                  RT_STRING0x46b4c0x328dataEnglishUnited States0.4405940594059406
                                                  RT_STRING0x46e740xc2dataEnglishUnited States0.5721649484536082
                                                  RT_STRING0x46f380x3edataChineseChina0.6935483870967742
                                                  RT_STRING0x46f780x5cedataEnglishUnited States0.37012113055181695
                                                  RT_STRING0x475480x188dataEnglishUnited States0.4336734693877551
                                                  RT_STRING0x476d00x5faOpenPGP Public KeyEnglishUnited States0.3457516339869281
                                                  RT_STRING0x47ccc0x97cdataEnglishUnited States0.2759472817133443
                                                  RT_STRING0x486480x3dedataEnglishUnited States0.33636363636363636
                                                  RT_STRING0x48a280x114dataEnglishUnited States0.5652173913043478
                                                  RT_STRING0x48b3c0x3badataEnglishUnited States0.34276729559748426
                                                  RT_STRING0x48ef80x9adataEnglishUnited States0.5844155844155844
                                                  RT_STRING0x48f940x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                                                  RT_STRING0x491ac0x624dataEnglishUnited States0.3575063613231552
                                                  RT_STRING0x497d00x660dataEnglishUnited States0.3474264705882353
                                                  RT_STRING0x49e300x2e2dataEnglishUnited States0.4037940379403794
                                                  RT_STRING0x4a1140x6cdata0.6851851851851852
                                                  RT_STRING0x4a1800x2d0data0.46111111111111114
                                                  RT_STRING0x4a4500x250data0.49155405405405406
                                                  RT_STRING0x4a6a00x214data0.4567669172932331
                                                  RT_STRING0x4a8b40x180data0.5286458333333334
                                                  RT_STRING0x4aa340x1a4data0.5428571428571428
                                                  RT_STRING0x4abd80x3c0data0.3489583333333333
                                                  RT_STRING0x4af980x6a4data0.36
                                                  RT_STRING0x4b63c0x48cdata0.38230240549828176
                                                  RT_STRING0x4bac80x19cdata0.5145631067961165
                                                  RT_STRING0x4bc640xecdata0.597457627118644
                                                  RT_STRING0x4bd500x1a8data0.5
                                                  RT_STRING0x4bef80x2b8data0.4454022988505747
                                                  RT_STRING0x4c1b00x414data0.36398467432950193
                                                  RT_STRING0x4c5c40x3b4data0.37658227848101267
                                                  RT_STRING0x4c9780x340data0.3762019230769231
                                                  RT_STRING0x4ccb80x354data0.35563380281690143
                                                  RT_STRING0x4d00c0x2d0data0.4513888888888889
                                                  RT_STRING0x4d2dc0xd8data0.5694444444444444
                                                  RT_STRING0x4d3b40xf0data0.55
                                                  RT_STRING0x4d4a40x350data0.4033018867924528
                                                  RT_STRING0x4d7f40x384data0.37444444444444447
                                                  RT_STRING0x4db780x2d8data0.375
                                                  RT_RCDATA0x4de500x10data1.5
                                                  RT_RCDATA0x4de600x590data0.6327247191011236
                                                  RT_RCDATA0x4e3f00x133dbDelphi compiled form 'TCreatePluginForm'0.09238558069305046
                                                  RT_RCDATA0x617cc0x2f1aDelphi compiled form 'TdxBarCustomizingForm'0.25543207828827336
                                                  RT_RCDATA0x646e80x4b0Delphi compiled form 'TdxBarItemAddEditor'0.4608333333333333
                                                  RT_RCDATA0x64b980x287Delphi compiled form 'TdxBarNameEd'0.6058732612055642
                                                  RT_RCDATA0x64e200x171Delphi compiled form 'TdxBarSubMenuEditor'0.7100271002710027
                                                  RT_RCDATA0x64f940x1491Delphi compiled form 'TFindForm'0.2641975308641975
                                                  RT_RCDATA0x664280x49cDelphi compiled form 'TfrmAddGroupItems'0.4610169491525424
                                                  RT_RCDATA0x668c40x1595Delphi compiled form 'THintForm'0.11782805429864253
                                                  RT_RCDATA0x67e5c0x1aafDelphi compiled form 'TInputStringForm'0.2577953447518665
                                                  RT_MESSAGETABLE0x6990c0x2840dataEnglishUnited States0.28823757763975155
                                                  RT_GROUP_CURSOR0x6c14c0x14data1.35
                                                  RT_GROUP_CURSOR0x6c1600x14data1.3
                                                  RT_GROUP_CURSOR0x6c1740x14data1.4
                                                  RT_GROUP_CURSOR0x6c1880x14data1.4
                                                  RT_GROUP_CURSOR0x6c19c0x14data1.4
                                                  RT_GROUP_CURSOR0x6c1b00x14data1.4
                                                  RT_GROUP_CURSOR0x6c1c40x14data1.4
                                                  RT_GROUP_CURSOR0x6c1d80x14data1.4
                                                  RT_GROUP_CURSOR0x6c1ec0x14data1.4
                                                  RT_GROUP_CURSOR0x6c2000x14data1.4
                                                  RT_GROUP_CURSOR0x6c2140x14data1.4
                                                  RT_GROUP_CURSOR0x6c2280x14data1.4
                                                  RT_GROUP_CURSOR0x6c23c0x14data1.4
                                                  RT_GROUP_CURSOR0x6c2500x14data1.4
                                                  RT_GROUP_CURSOR0x6c2640x14data1.4
                                                  RT_GROUP_CURSOR0x6c2780x14data1.4
                                                  RT_GROUP_CURSOR0x6c28c0x14data1.4
                                                  RT_GROUP_CURSOR0x6c2a00x14data1.4
                                                  RT_GROUP_CURSOR0x6c2b40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                  RT_GROUP_CURSOR0x6c2c80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                  RT_GROUP_CURSOR0x6c2dc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                  RT_GROUP_CURSOR0x6c2f00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                  RT_GROUP_CURSOR0x6c3040x14Lotus unknown worksheet or configuration, revision 0x11.3
                                                  RT_GROUP_ICON0x6c3180x84data0.7045454545454546
                                                  RT_VERSION0x6c39c0x3f4data0.475296442687747
                                                  RT_VERSION0x6c7900x328dataEnglishUnited States0.44183168316831684
                                                  RT_MANIFEST0x6cab80x244XML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.453448275862069
                                                  DLLImport
                                                  COMCTL32.dll
                                                  KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                  USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                  GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                  SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                  ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                  OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                  MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                  Language of compilation systemCountry where language is spokenMap
                                                  ChineseChina
                                                  RussianRussia
                                                  EnglishUnited States
                                                  No network behavior found

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:03:12:40
                                                  Start date:27/12/2024
                                                  Path:C:\Users\user\Desktop\S1Rv3ioghk.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\S1Rv3ioghk.exe"
                                                  Imagebase:0x400000
                                                  File size:4'477'216 bytes
                                                  MD5 hash:FD7EC2C34E2593E4D606E0A9D37E257A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:03:12:41
                                                  Start date:27/12/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
                                                  Imagebase:0x790000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:03:12:41
                                                  Start date:27/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:03:12:41
                                                  Start date:27/12/2024
                                                  Path:C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\Public\Bulete\program\ShellExperienceHosts.exe
                                                  Imagebase:0x400000
                                                  File size:649'416 bytes
                                                  MD5 hash:0922B22053A6D5D9516EA910D34A4771
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:03:12:43
                                                  Start date:27/12/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 852
                                                  Imagebase:0x1e0000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:2.9%
                                                    Dynamic/Decrypted Code Coverage:0.1%
                                                    Signature Coverage:17%
                                                    Total number of Nodes:1118
                                                    Total number of Limit Nodes:45
                                                    execution_graph 69167 6c6fd7df 69180 6c8805ed 69167->69180 69169 6c6fd7ef 69185 6c701262 69169->69185 69172 6c701262 29 API calls 69173 6c6fd841 69172->69173 69174 6c701262 29 API calls 69173->69174 69175 6c6fd898 69174->69175 69188 6c6fbfd6 69175->69188 69178 6c701262 29 API calls 69179 6c6fd8af 69178->69179 69183 6c883811 __fread_nolock 69180->69183 69181 6c88384d 69181->69169 69182 6c88383a RtlAllocateHeap 69182->69181 69182->69183 69183->69181 69183->69182 69195 6c879b6b EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 69183->69195 69196 6c701277 69185->69196 69204 6c75731e 69188->69204 69190 6c6fc013 69216 6c755c74 69190->69216 69195->69183 69197 6c701286 69196->69197 69198 6c70128d 69196->69198 69202 6c87a2e8 29 API calls 69197->69202 69203 6c87a277 29 API calls 69198->69203 69201 6c6fd81e 69201->69172 69202->69201 69203->69201 69205 6c75732a __EH_prolog3 69204->69205 69222 6c703fff 69205->69222 69211 6c75738f 69250 6c6ffaf8 69211->69250 69213 6c75739c 69261 6c7035a7 69213->69261 69215 6c7573ab Concurrency::details::ExternalContextBase::~ExternalContextBase 69215->69190 69387 6c76027c 69216->69387 69218 6c6fc027 69219 6c78dd01 GetModuleHandleW 69218->69219 69220 6c78dd16 GetProcAddress 69219->69220 69221 6c6fc052 69219->69221 69220->69221 69221->69178 69223 6c70400e __EH_prolog3_GS 69222->69223 69268 6c77ccad 69223->69268 69225 6c704024 69226 6c704039 69225->69226 69297 6c87d2d7 27 API calls 3 library calls 69225->69297 69274 6c77c8b9 69226->69274 69230 6c704159 69298 6c77e7dc RaiseException Concurrency::cancel_current_task 69230->69298 69233 6c70405d 69233->69230 69235 6c704065 GetCurrentThread GetCurrentThreadId GetVersionExW 69233->69235 69236 6c70411c 69235->69236 69294 6c7c12be 69236->69294 69238 6c704156 69239 6c6d1f44 69238->69239 69240 6c6d1f7f 69239->69240 69241 6c6d1f83 69240->69241 69359 6c6d287a 39 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69240->69359 69244 6c757608 69241->69244 69243 6c6d1fb6 69245 6c757614 __EH_prolog3 69244->69245 69246 6c75761f Concurrency::details::ExternalContextBase::~ExternalContextBase 69245->69246 69360 6c701139 69245->69360 69246->69211 69251 6c6ffb33 69250->69251 69252 6c6ffb8a 69251->69252 69253 6c6ffb37 69251->69253 69384 6c6d287a 39 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69252->69384 69256 6c6ffb67 69253->69256 69257 6c6ffb55 69253->69257 69255 6c6ffb9b 69255->69213 69383 6c6d44da 54 API calls 69256->69383 69382 6c6d1fca 90 API calls 69257->69382 69260 6c6ffb65 69260->69213 69262 6c7035bf 69261->69262 69267 6c7035d2 69261->69267 69263 6c7035e4 69262->69263 69264 6c7035cb 69262->69264 69386 6c6d45a0 54 API calls 4 library calls 69263->69386 69385 6c703688 54 API calls 69264->69385 69267->69215 69269 6c77ccb9 __EH_prolog3 69268->69269 69299 6c77fac2 69269->69299 69273 6c77ccdb Concurrency::details::ExternalContextBase::~ExternalContextBase 69273->69225 69275 6c7c170b Concurrency::details::ExternalContextBase::~ExternalContextBase 65 API calls 69274->69275 69276 6c77c8c8 69275->69276 69277 6c704046 69276->69277 69311 6c7c17ce 7 API calls 2 library calls 69276->69311 69277->69230 69279 6c7c170b 69277->69279 69282 6c7c1717 __EH_prolog3 69279->69282 69280 6c7c1790 69343 6c77e7dc RaiseException Concurrency::cancel_current_task 69280->69343 69281 6c7c1758 69334 6c7c1687 EnterCriticalSection 69281->69334 69282->69280 69282->69281 69284 6c7c173e 69282->69284 69341 6c7c134e TlsAlloc InitializeCriticalSection RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 69282->69341 69284->69280 69312 6c7c138e EnterCriticalSection 69284->69312 69290 6c7c176a 69342 6c7c1555 47 API calls 3 library calls 69290->69342 69291 6c7c1786 Concurrency::details::ExternalContextBase::~ExternalContextBase 69291->69233 69292 6c7c1752 69292->69280 69292->69281 69351 6c7c11c4 69294->69351 69296 6c7c12c8 69296->69296 69297->69226 69300 6c77c8b9 Concurrency::details::ExternalContextBase::~ExternalContextBase 71 API calls 69299->69300 69301 6c77ccc3 69300->69301 69302 6c77d0ae 69301->69302 69305 6c77c98e 69302->69305 69304 6c77d0c5 GetCursorPos 69304->69273 69306 6c7c170b Concurrency::details::ExternalContextBase::~ExternalContextBase 65 API calls 69305->69306 69307 6c77c99d 69306->69307 69307->69304 69310 6c86c646 RaiseException 69307->69310 69309 6c77e7f5 69310->69309 69311->69277 69317 6c7c13b2 69312->69317 69313 6c7c14c5 LeaveCriticalSection 69349 6c77e7a8 RaiseException Concurrency::cancel_current_task 69313->69349 69315 6c7c1462 __fread_nolock 69318 6c7c1492 LeaveCriticalSection 69315->69318 69317->69313 69317->69315 69319 6c7c1419 GlobalHandle 69317->69319 69320 6c7c1404 69317->69320 69318->69292 69321 6c7c142c GlobalUnlock 69319->69321 69322 6c7c14ad 69319->69322 69344 6c71589a 69320->69344 69326 6c71589a Concurrency::details::ExternalContextBase::~ExternalContextBase 39 API calls 69321->69326 69322->69313 69327 6c7c14b2 GlobalHandle 69322->69327 69330 6c7c1442 GlobalReAlloc 69326->69330 69327->69313 69331 6c7c14be GlobalLock 69327->69331 69328 6c7c144e 69328->69322 69332 6c7c1452 GlobalLock 69328->69332 69330->69328 69331->69313 69332->69313 69332->69315 69335 6c7c16cb LeaveCriticalSection 69334->69335 69336 6c7c16a0 69334->69336 69337 6c7c16d4 69335->69337 69336->69335 69338 6c7c16a5 TlsGetValue 69336->69338 69337->69290 69337->69291 69338->69335 69339 6c7c16b1 69338->69339 69339->69335 69340 6c7c16bd LeaveCriticalSection 69339->69340 69340->69337 69341->69284 69342->69291 69346 6c7158ad Concurrency::details::ExternalContextBase::~ExternalContextBase 69344->69346 69345 6c7158b4 GlobalAlloc 69345->69328 69346->69345 69350 6c6d287a 39 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69346->69350 69348 6c7158bf 69350->69348 69352 6c7c11cc 69351->69352 69353 6c7c11cd IsProcessorFeaturePresent 69351->69353 69352->69296 69355 6c7ed265 69353->69355 69358 6c7ed34b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 69355->69358 69357 6c7ed348 69357->69296 69358->69357 69359->69243 69363 6c70113e 69360->69363 69361 6c8805ed _Yarn 3 API calls 69361->69363 69362 6c701158 69362->69246 69372 6c80171c 69362->69372 69363->69361 69363->69362 69365 6c70115a 69363->69365 69378 6c879b6b EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 69363->69378 69366 6c7c01c8 Concurrency::details::ExternalContextBase::~ExternalContextBase 69365->69366 69367 6c701164 Concurrency::cancel_current_task 69365->69367 69380 6c86c646 RaiseException 69366->69380 69379 6c86c646 RaiseException 69367->69379 69370 6c7c01e4 69371 6c7bf61e 69373 6c80174a 69372->69373 69374 6c80172e SHGetMalloc 69372->69374 69381 6c77e7dc RaiseException Concurrency::cancel_current_task 69373->69381 69374->69373 69375 6c801746 69374->69375 69375->69246 69378->69363 69379->69371 69380->69370 69382->69260 69383->69260 69384->69255 69385->69267 69386->69267 69388 6c760288 __EH_prolog3 69387->69388 69389 6c77fac2 71 API calls 69388->69389 69390 6c760292 69389->69390 69393 6c760793 69390->69393 69392 6c7602b8 Concurrency::details::ExternalContextBase::~ExternalContextBase 69392->69218 69394 6c77c8b9 Concurrency::details::ExternalContextBase::~ExternalContextBase 71 API calls 69393->69394 69395 6c7607d5 69394->69395 69402 6c82e632 69395->69402 69397 6c7607de 69413 6c7c12dc 69397->69413 69401 6c7607ee 69401->69392 69403 6c82e6a0 69402->69403 69404 6c82e63e 69402->69404 69424 6c77e7dc RaiseException Concurrency::cancel_current_task 69403->69424 69405 6c82e64c 69404->69405 69423 6c82e6ca InitializeCriticalSection 69404->69423 69408 6c82e68e EnterCriticalSection 69405->69408 69409 6c82e65c EnterCriticalSection 69405->69409 69408->69397 69411 6c82e673 InitializeCriticalSection 69409->69411 69412 6c82e686 LeaveCriticalSection 69409->69412 69411->69412 69412->69408 69414 6c7607e7 69413->69414 69415 6c7c12f6 69413->69415 69418 6c82e6a6 69414->69418 69425 6c77e7dc RaiseException Concurrency::cancel_current_task 69415->69425 69419 6c82e6b1 LeaveCriticalSection 69418->69419 69420 6c82e6c4 69418->69420 69419->69401 69426 6c77e7dc RaiseException Concurrency::cancel_current_task 69420->69426 69423->69405 69427 6c88a41b CreateFileW 69428 4a152f LdrInitializeThunk 69429 6c6dcb4a 69430 6c6dcb74 69429->69430 69432 6c6dcd3f 69430->69432 69434 6c6dfd78 69430->69434 69438 6c87ed83 69430->69438 69435 6c6dfd97 69434->69435 69437 6c6e0238 69435->69437 69442 6c88009d 26 API calls __snprintf_s 69435->69442 69437->69430 69439 6c87ed96 __snprintf_s 69438->69439 69443 6c87ee41 69439->69443 69441 6c87eda2 __snprintf_s 69441->69430 69442->69435 69444 6c87ee4d ___scrt_is_nonwritable_in_current_image 69443->69444 69445 6c87ee57 69444->69445 69446 6c87ee7a 69444->69446 69469 6c87c3d0 24 API calls 2 library calls 69445->69469 69449 6c87ee72 69446->69449 69454 6c86f83a EnterCriticalSection 69446->69454 69449->69441 69450 6c87ee98 69455 6c87edb3 69450->69455 69452 6c87eea5 69470 6c87eed0 LeaveCriticalSection __fread_nolock 69452->69470 69454->69450 69456 6c87ede3 69455->69456 69457 6c87edc0 69455->69457 69459 6c87eddb 69456->69459 69471 6c87ef99 69456->69471 69493 6c87c3d0 24 API calls 2 library calls 69457->69493 69459->69452 69465 6c87ee0f 69486 6c88bb80 69465->69486 69469->69449 69470->69449 69472 6c87efb2 69471->69472 69473 6c87edfb 69471->69473 69472->69473 69474 6c87b10d __fread_nolock 24 API calls 69472->69474 69477 6c88810c 69473->69477 69475 6c87efce 69474->69475 69498 6c88c026 59 API calls 3 library calls 69475->69498 69478 6c888123 69477->69478 69480 6c87ee03 69477->69480 69479 6c8837d7 ___free_lconv_mon 2 API calls 69478->69479 69478->69480 69479->69480 69481 6c87b10d 69480->69481 69482 6c87b12e 69481->69482 69483 6c87b119 69481->69483 69482->69465 69499 6c87c227 24 API calls ___std_exception_copy 69483->69499 69485 6c87b129 69485->69465 69487 6c88bba9 69486->69487 69488 6c87ee16 69486->69488 69489 6c88bbf8 69487->69489 69491 6c88bbd0 69487->69491 69488->69459 69494 6c8837d7 69488->69494 69508 6c87c3d0 24 API calls 2 library calls 69489->69508 69500 6c88bc23 69491->69500 69493->69459 69495 6c8837e2 RtlFreeHeap 69494->69495 69497 6c883804 __dosmaperr 69494->69497 69496 6c8837f7 GetLastError 69495->69496 69495->69497 69496->69497 69497->69459 69498->69473 69499->69485 69501 6c88bc2f ___scrt_is_nonwritable_in_current_image 69500->69501 69509 6c87b941 EnterCriticalSection 69501->69509 69503 6c88bc3d 69504 6c88bc6e 69503->69504 69510 6c88bae0 69503->69510 69523 6c88bca8 LeaveCriticalSection __wsopen_s 69504->69523 69507 6c88bc91 69507->69488 69508->69488 69509->69503 69524 6c87b553 69510->69524 69512 6c88baf6 69529 6c87b6d0 SetStdHandle __dosmaperr __wsopen_s 69512->69529 69513 6c88baf0 69513->69512 69514 6c88bb28 69513->69514 69516 6c87b553 __wsopen_s 24 API calls 69513->69516 69514->69512 69517 6c87b553 __wsopen_s 24 API calls 69514->69517 69518 6c88bb1f 69516->69518 69519 6c88bb34 CloseHandle 69517->69519 69520 6c87b553 __wsopen_s 24 API calls 69518->69520 69519->69512 69521 6c88bb40 GetLastError 69519->69521 69520->69514 69521->69512 69522 6c88bb4e __wsopen_s 69522->69504 69523->69507 69525 6c87b560 __dosmaperr 69524->69525 69527 6c87b575 __dosmaperr 69524->69527 69525->69513 69526 6c87b59a 69526->69513 69527->69526 69530 6c87c227 24 API calls ___std_exception_copy 69527->69530 69529->69522 69530->69525 69531 6c6fb7d7 69532 6c6fb8db 69531->69532 69575 6c6f9168 69532->69575 69534 6c6fb912 std::ios_base::_Ios_base_dtor 69551 6c6fbb82 69534->69551 69568 6c6fbac9 std::ios_base::_Ios_base_dtor 69534->69568 69604 6c6f9828 69534->69604 69536 6c6fbb40 CreateThread 69541 6c6fbb5a WaitForSingleObject 69536->69541 69542 6c6fbc35 69536->69542 70335 6c6f9b35 69536->70335 69540 6c6fb979 69612 6c6fb195 GetModuleFileNameA 69540->69612 69541->69542 69546 6c6fbb73 CloseHandle 69541->69546 69704 6c6fb3ef 29 API calls 4 library calls 69542->69704 69546->69551 69554 6c6fbbab std::ios_base::_Ios_base_dtor 69546->69554 69547 6c6fbcec 69715 6c6d9714 28 API calls 69547->69715 69549 6c6fbb18 CreateThread 69549->69536 70313 6c6fa446 69549->70313 69550 6c6fbc45 69705 6c6fb0de 29 API calls 3 library calls 69550->69705 69551->69554 69710 6c87c237 69551->69710 69556 6c6fbc58 69706 6c6f83fc 28 API calls 5 library calls 69556->69706 69559 6c6fb985 69559->69547 69560 6c6fb9b6 69559->69560 69565 6c6fbc1d 69559->69565 69570 6c6fb9bf std::ios_base::_Ios_base_dtor _Yarn 69559->69570 69703 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69560->69703 69563 6c6fbc72 69707 6c6dc08c 24 API calls std::ios_base::_Ios_base_dtor 69563->69707 69566 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69565->69566 69566->69570 69568->69536 69568->69551 69648 6c6fa6cf 69568->69648 69569 6c6fbc9a 69708 6c6f9953 116 API calls 3 library calls 69569->69708 69570->69551 69635 6c88067e 69570->69635 69572 6c6fbcbd CreateThread 69709 6c6f86c6 120 API calls 4 library calls 69572->69709 69574 6c6fbcd4 69574->69551 69576 6c6f91af 69575->69576 69716 6c6e4700 69576->69716 69583 6c6f9375 69583->69534 69585 6c6f938b 69750 6c6d9714 28 API calls 69585->69750 69586 6c6f921a 69589 6c6f928b 69586->69589 69590 6c6f9280 69586->69590 69594 6c6f921f __fread_nolock 69586->69594 69588 6c6f9390 69592 6c87c237 24 API calls 69588->69592 69591 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69589->69591 69747 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69590->69747 69591->69594 69595 6c6f9395 69592->69595 69740 6c6f96ac 69594->69740 69751 6c6dc894 64 API calls std::ios_base::_Ios_base_dtor 69595->69751 69598 6c6f93ad 69598->69534 69600 6c6f92e8 69600->69588 69603 6c6f9240 std::ios_base::_Ios_base_dtor 69600->69603 69601 6c6f9351 69748 6c6dc572 74 API calls 69601->69748 69749 6c6dc894 64 API calls std::ios_base::_Ios_base_dtor 69603->69749 70118 6c6d8e2d 69604->70118 69606 6c6f988b std::ios_base::_Ios_base_dtor 69607 6c6f9918 std::ios_base::_Ios_base_dtor 69606->69607 69608 6c87c237 24 API calls 69606->69608 69607->69540 69609 6c6f993f 69608->69609 70174 6c6dc08c 24 API calls std::ios_base::_Ios_base_dtor 69609->70174 69611 6c6f994e 69611->69540 69613 6c6fb1ec _strlen 69612->69613 69614 6c6fb1f7 69613->69614 69615 6c6fb3c5 69613->69615 69618 6c6fb238 69614->69618 69619 6c6fb240 69614->69619 69628 6c6fb1fe _Yarn 69614->69628 70285 6c6d9714 28 API calls 69615->70285 69617 6c6fb3ca 70286 6c6d9714 28 API calls 69617->70286 70283 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69618->70283 69622 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69619->69622 69622->69628 69623 6c87c237 24 API calls 69624 6c6fb3db 69623->69624 70287 6c6dc08c 24 API calls std::ios_base::_Ios_base_dtor 69624->70287 69626 6c6fb3ea 69626->69559 69627 6c6fb39e std::ios_base::_Ios_base_dtor 69627->69559 69628->69617 69629 6c6fb2cd 69628->69629 69634 6c6fb2d2 _Yarn 69628->69634 69630 6c6fb335 69629->69630 69631 6c6fb340 69629->69631 69629->69634 70284 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69630->70284 69633 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69631->69633 69633->69634 69634->69623 69634->69627 69636 6c88068c 69635->69636 69637 6c880696 69635->69637 69638 6c88d709 2 API calls 69636->69638 69639 6c8806e8 __wsopen_s 36 API calls 69637->69639 69640 6c880693 69638->69640 69641 6c8806b0 69639->69641 69640->69568 69642 6c86ef42 __wsopen_s 7 API calls 69641->69642 69643 6c8806bd 69642->69643 69644 6c8806c4 69643->69644 70288 6c88d709 DeleteFileW 69643->70288 69646 6c8837d7 ___free_lconv_mon 2 API calls 69644->69646 69647 6c8806e2 69644->69647 69646->69647 69647->69568 69649 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69648->69649 69651 6c6fa71c 69649->69651 69650 6c6fa7ac std::ios_base::_Ios_base_dtor _Yarn 69661 6c6fa85b GetFileAttributesA 69650->69661 69651->69650 69652 6c6fb021 69651->69652 69654 6c6fa79f 69651->69654 69655 6c6fa7d1 69651->69655 70297 6c6d9714 28 API calls 69652->70297 70292 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69654->70292 69656 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69655->69656 69656->69650 69657 6c6fb02d 70298 6c6d9714 28 API calls 69657->70298 69660 6c6fb039 70299 6c6d9714 28 API calls 69660->70299 69663 6c6fa86b SHGetFolderPathA 69661->69663 69668 6c6faf5b std::ios_base::_Ios_base_dtor 69661->69668 69663->69668 69670 6c6fa88d _strlen 69663->69670 69664 6c6fb045 70300 6c6d9714 28 API calls 69664->70300 69665 6c6fafb6 std::ios_base::_Ios_base_dtor 69665->69549 69667 6c6fb051 70301 6c6d9714 28 API calls 69667->70301 69668->69665 69669 6c87c237 24 API calls 69668->69669 69669->69652 69670->69657 69673 6c6fa8f9 69670->69673 69674 6c6fa904 69670->69674 69679 6c6fa8b4 _Yarn 69670->69679 70293 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69673->70293 69677 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69674->69677 69677->69679 69679->69660 69680 6c6fa960 69679->69680 69682 6c6faff6 69679->69682 69686 6c6fa969 std::ios_base::_Ios_base_dtor _Yarn 69679->69686 70294 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69680->70294 69683 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69682->69683 69683->69686 69684 6c6fab11 70295 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69684->70295 69686->69664 69686->69668 69686->69684 69687 6c6fb00e 69686->69687 69693 6c6faca1 std::ios_base::_Ios_base_dtor _Yarn 69686->69693 69696 6c6fab1e std::ios_base::_Ios_base_dtor _Yarn 69686->69696 69688 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69687->69688 69688->69696 69689 6c6fae63 GetFileAttributesA 69689->69668 69692 6c6fae73 CoInitialize CoCreateInstance 69689->69692 69690 6c6fac91 70296 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 69690->70296 69694 6c6fae9b MultiByteToWideChar 69692->69694 69695 6c6faf55 CoUninitialize 69692->69695 69693->69668 69693->69689 69701 6c6faed5 69694->69701 69695->69668 69696->69667 69696->69668 69696->69690 69696->69693 69697 6c6faf0a 69696->69697 69698 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69697->69698 69698->69693 69700 6c6faf43 69700->69695 69701->69700 69702 6c6faf1e MultiByteToWideChar 69701->69702 69702->69700 69703->69570 69704->69550 69705->69556 69706->69563 69707->69569 69708->69572 69709->69574 70302 6c87c476 24 API calls 2 library calls 69710->70302 69712 6c87c246 70303 6c87c254 IsProcessorFeaturePresent 69712->70303 69714 6c87c253 69717 6c6e4732 69716->69717 69752 6c6e485c 69717->69752 69723 6c6e47df 69724 6c6e480a 69723->69724 69767 6c6e27f4 69723->69767 69724->69603 69726 6c6f93d0 69724->69726 70024 6c6e4bf4 69726->70024 69729 6c6f91e1 69731 6c6f94fa 69729->69731 69732 6c6e27f4 37 API calls 69731->69732 69733 6c6f955f 69732->69733 69734 6c6e4bf4 69 API calls 69733->69734 69735 6c6f956a 69734->69735 69736 6c6f95ac 69735->69736 69739 6c6df1a2 62 API calls 69735->69739 69737 6c6e27f4 37 API calls 69736->69737 69738 6c6f9200 69737->69738 69738->69585 69738->69586 69739->69736 69741 6c6e4bf4 69 API calls 69740->69741 69742 6c6f96f6 69741->69742 69743 6c6f972a 69742->69743 70114 6c6de4d8 69742->70114 69744 6c6e27f4 37 API calls 69743->69744 69745 6c6f92d9 69744->69745 69745->69600 69745->69601 69747->69594 69748->69603 69749->69583 69751->69598 69753 6c6e4896 69752->69753 69780 6c6e2472 69753->69780 69756 6c6e22ce 69832 6c6e3d78 69756->69832 69759 6c6e239a 69760 6c6e23e5 69759->69760 69766 6c6e23d0 69759->69766 69837 6c7bf4f1 69760->69837 69764 6c6e2404 69846 6c6e11ee 60 API calls 2 library calls 69764->69846 69766->69723 69768 6c6e281d 69767->69768 69769 6c6e2815 69767->69769 69770 6c6e282d 69768->69770 70019 6c86c646 RaiseException 69768->70019 69769->69724 70020 6c6e2a6b 35 API calls 69770->70020 69773 6c6e2853 70021 6c6e2876 28 API calls 69773->70021 69775 6c6e286b 69776 6c6e2876 69775->69776 70022 6c86c646 RaiseException 69775->70022 69778 6c6e28b1 69776->69778 70023 6c6e2ec8 28 API calls 4 library calls 69776->70023 69778->69724 69787 6c6e26b8 69780->69787 69782 6c6e2480 69785 6c6e25e6 69782->69785 69786 6c6e27f4 37 API calls 69782->69786 69792 6c7bf039 9 API calls 2 library calls 69782->69792 69793 6c6e274a 61 API calls 69782->69793 69785->69756 69786->69782 69788 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69787->69788 69789 6c6e270f 69788->69789 69794 6c7bf3d1 69789->69794 69791 6c6e271f 69791->69782 69792->69782 69793->69782 69795 6c7bf3dd __EH_prolog3 69794->69795 69806 6c7bef60 69795->69806 69799 6c7bf3fb 69820 6c7bf464 28 API calls std::locale::_Setgloballocale 69799->69820 69802 6c7bf456 Concurrency::details::ExternalContextBase::~ExternalContextBase 69802->69791 69803 6c7bf403 69821 6c7bf25b 69803->69821 69805 6c7bf419 69812 6c7bef91 69805->69812 69807 6c7bef6f 69806->69807 69808 6c7bef76 69806->69808 69827 6c87c967 6 API calls std::_Lockit::_Lockit 69807->69827 69809 6c7bef74 69808->69809 69828 6c84e866 EnterCriticalSection 69808->69828 69809->69805 69819 6c7bf2da 6 API calls 2 library calls 69809->69819 69813 6c87c975 69812->69813 69815 6c7bef9b 69812->69815 69830 6c87c950 LeaveCriticalSection 69813->69830 69818 6c7befae 69815->69818 69829 6c84e874 LeaveCriticalSection 69815->69829 69817 6c87c97c 69817->69802 69818->69802 69819->69799 69820->69803 69822 6c7bf269 69821->69822 69826 6c7bf294 _Yarn 69821->69826 69823 6c7bf275 69822->69823 69831 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 69822->69831 69825 6c8805ed _Yarn 3 API calls 69823->69825 69823->69826 69825->69826 69826->69805 69827->69809 69828->69809 69829->69818 69830->69817 69831->69823 69833 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 69832->69833 69834 6c6e3dc3 69833->69834 69835 6c7bf3d1 32 API calls 69834->69835 69836 6c6e22dc 69835->69836 69836->69759 69838 6c7bf4fa 69837->69838 69839 6c6e23f3 69838->69839 69847 6c87b491 69838->69847 69839->69766 69845 6c6e0244 24 API calls 69839->69845 69841 6c7bf54e 69841->69839 69858 6c87b134 69841->69858 69843 6c7bf569 69843->69839 69844 6c87ed83 64 API calls 69843->69844 69844->69839 69845->69764 69846->69766 69848 6c87b49c ___scrt_is_nonwritable_in_current_image 69847->69848 69849 6c87b4af 69848->69849 69850 6c87b4cf 69848->69850 69876 6c87c227 24 API calls ___std_exception_copy 69849->69876 69852 6c87b4bf 69850->69852 69862 6c889e28 69850->69862 69852->69841 69859 6c87b147 __snprintf_s 69858->69859 69979 6c87b3e7 69859->69979 69861 6c87b15c __snprintf_s 69861->69843 69863 6c889e34 ___scrt_is_nonwritable_in_current_image 69862->69863 69878 6c87c939 EnterCriticalSection 69863->69878 69865 6c889e42 69879 6c889ecc 69865->69879 69870 6c88a1f2 69871 6c88a1fd 69870->69871 69898 6c87aee3 69871->69898 69873 6c87b513 69877 6c87b53c LeaveCriticalSection __fread_nolock 69873->69877 69876->69852 69877->69852 69878->69865 69881 6c889eef 69879->69881 69880 6c889f47 69883 6c8837d7 ___free_lconv_mon 2 API calls 69880->69883 69881->69880 69886 6c889e4f 69881->69886 69893 6c86f83a EnterCriticalSection 69881->69893 69894 6c86f84e LeaveCriticalSection 69881->69894 69884 6c889f59 69883->69884 69884->69886 69895 6c885a87 6 API calls std::_Lockit::_Lockit 69884->69895 69890 6c889e88 69886->69890 69887 6c889f78 69896 6c86f83a EnterCriticalSection 69887->69896 69897 6c87c950 LeaveCriticalSection 69890->69897 69892 6c87b4ea 69892->69852 69892->69870 69893->69881 69894->69881 69895->69887 69896->69886 69897->69892 69899 6c87af02 69898->69899 69900 6c87af15 69899->69900 69903 6c87af2a 69899->69903 69914 6c87c227 24 API calls ___std_exception_copy 69900->69914 69902 6c87af25 69902->69873 69911 6c8930b0 69902->69911 69909 6c87b04a 69903->69909 69915 6c87d137 36 API calls ___std_exception_copy 69903->69915 69906 6c87b09a 69906->69909 69916 6c87d137 36 API calls ___std_exception_copy 69906->69916 69908 6c87b0b8 69908->69909 69917 6c87d137 36 API calls ___std_exception_copy 69908->69917 69909->69902 69918 6c87c227 24 API calls ___std_exception_copy 69909->69918 69919 6c893468 69911->69919 69914->69902 69915->69906 69916->69908 69917->69909 69918->69902 69921 6c893474 ___scrt_is_nonwritable_in_current_image 69919->69921 69920 6c89347b 69937 6c87c227 24 API calls ___std_exception_copy 69920->69937 69921->69920 69922 6c8934a6 69921->69922 69928 6c8930d0 69922->69928 69927 6c8930cb 69927->69873 69939 6c8806e8 69928->69939 69933 6c893106 69935 6c893138 69933->69935 69936 6c8837d7 ___free_lconv_mon 2 API calls 69933->69936 69938 6c8934fd LeaveCriticalSection __wsopen_s 69935->69938 69936->69935 69937->69927 69938->69927 69940 6c86ee48 __wsopen_s 36 API calls 69939->69940 69941 6c8806fa 69940->69941 69942 6c88070c 69941->69942 69943 6c88583d __wsopen_s 5 API calls 69941->69943 69944 6c86ef42 69942->69944 69943->69942 69945 6c86efb7 __wsopen_s 7 API calls 69944->69945 69946 6c86ef5a 69945->69946 69946->69933 69947 6c89313e 69946->69947 69948 6c8935d8 __wsopen_s 24 API calls 69947->69948 69949 6c89315b 69948->69949 69950 6c87b5bd __wsopen_s 13 API calls 69949->69950 69954 6c893170 __dosmaperr 69949->69954 69951 6c89318e 69950->69951 69952 6c893543 __wsopen_s CreateFileW 69951->69952 69951->69954 69959 6c8931e7 69952->69959 69953 6c893264 GetFileType 69955 6c89326f GetLastError 69953->69955 69956 6c8932b6 69953->69956 69954->69933 69958 6c86f99c __dosmaperr 69955->69958 69962 6c87b761 __wsopen_s SetStdHandle 69956->69962 69957 6c893239 GetLastError 69957->69954 69960 6c89327d CloseHandle 69958->69960 69959->69953 69959->69957 69961 6c893543 __wsopen_s CreateFileW 69959->69961 69960->69954 69978 6c8932a6 69960->69978 69963 6c89322c 69961->69963 69964 6c8932d7 69962->69964 69963->69953 69963->69957 69965 6c893323 69964->69965 69967 6c893752 __wsopen_s 67 API calls 69964->69967 69966 6c8937fc __wsopen_s 67 API calls 69965->69966 69969 6c89332a 69965->69969 69968 6c893358 69966->69968 69967->69965 69968->69969 69970 6c893366 69968->69970 69971 6c88bab0 __wsopen_s 27 API calls 69969->69971 69970->69954 69972 6c8933e2 CloseHandle 69970->69972 69971->69954 69973 6c893543 __wsopen_s CreateFileW 69972->69973 69974 6c89340d 69973->69974 69975 6c893417 GetLastError 69974->69975 69974->69978 69976 6c893423 __dosmaperr 69975->69976 69977 6c87b6d0 __wsopen_s SetStdHandle 69976->69977 69977->69978 69978->69954 69981 6c87b3f3 ___scrt_is_nonwritable_in_current_image 69979->69981 69980 6c87b3f9 70002 6c87c3d0 24 API calls 2 library calls 69980->70002 69981->69980 69984 6c87b43c 69981->69984 69983 6c87b414 69983->69861 69990 6c86f83a EnterCriticalSection 69984->69990 69986 6c87b448 69991 6c87b2fb 69986->69991 69988 6c87b45e 70003 6c87b487 LeaveCriticalSection __fread_nolock 69988->70003 69990->69986 69992 6c87b321 69991->69992 69993 6c87b30e 69991->69993 70004 6c87b222 69992->70004 69993->69988 69995 6c87b35f 69998 6c87ef99 ___scrt_uninitialize_crt 59 API calls 69995->69998 69996 6c87b344 69996->69995 70001 6c87b3d2 69996->70001 70011 6c87fa9b 29 API calls 3 library calls 69996->70011 70000 6c87b372 69998->70000 70008 6c88a00e 70000->70008 70001->69988 70002->69983 70003->69983 70005 6c87b233 70004->70005 70007 6c87b28b 70004->70007 70005->70007 70012 6c889fce 26 API calls 2 library calls 70005->70012 70007->69996 70013 6c88a16f 70008->70013 70010 6c88a027 70010->70001 70011->69995 70012->70007 70014 6c87b553 __wsopen_s 24 API calls 70013->70014 70015 6c88a181 70014->70015 70016 6c88a19d SetFilePointerEx 70015->70016 70018 6c88a189 __wsopen_s 70015->70018 70017 6c88a1b5 GetLastError 70016->70017 70016->70018 70017->70018 70018->70010 70019->69770 70020->69773 70021->69775 70022->69776 70023->69776 70025 6c6e4c37 70024->70025 70034 6c6e4d74 70025->70034 70028 6c6df1a2 70029 6c6df1ca 70028->70029 70030 6c6df64a 70029->70030 70032 6c6dfd78 26 API calls 70029->70032 70046 6c87f390 70029->70046 70056 6c87b16e 70029->70056 70030->69729 70032->70029 70035 6c6e4ddb 70034->70035 70036 6c6e4db2 70034->70036 70040 6c6e4dea 70035->70040 70044 6c6e41a8 37 API calls 70035->70044 70037 6c6e27f4 37 API calls 70036->70037 70038 6c6e4c53 70037->70038 70038->69729 70038->70028 70040->70038 70045 6c6e354a 61 API calls 2 library calls 70040->70045 70042 6c6e4e24 70042->70038 70043 6c6e27f4 37 API calls 70042->70043 70043->70038 70044->70040 70045->70042 70047 6c87f3b0 70046->70047 70048 6c87f39b 70046->70048 70049 6c87f3cd 70047->70049 70050 6c87f3b8 70047->70050 70064 6c87c227 24 API calls ___std_exception_copy 70048->70064 70060 6c87fa65 70049->70060 70065 6c87c227 24 API calls ___std_exception_copy 70050->70065 70052 6c87f3c8 70052->70029 70054 6c87f3ab 70054->70029 70057 6c87b181 __snprintf_s 70056->70057 70058 6c87b3e7 62 API calls 70057->70058 70059 6c87b196 __snprintf_s 70058->70059 70059->70029 70061 6c87fa79 __snprintf_s 70060->70061 70066 6c88000e 70061->70066 70063 6c87fa85 __snprintf_s 70063->70052 70064->70054 70065->70052 70067 6c88001a ___scrt_is_nonwritable_in_current_image 70066->70067 70068 6c880021 70067->70068 70069 6c880044 70067->70069 70092 6c87c3d0 24 API calls 2 library calls 70068->70092 70077 6c86f83a EnterCriticalSection 70069->70077 70072 6c88003a 70072->70063 70073 6c880052 70078 6c87fe6d 70073->70078 70075 6c880061 70093 6c880093 LeaveCriticalSection __fread_nolock 70075->70093 70077->70073 70079 6c87fea4 70078->70079 70080 6c87fe7c 70078->70080 70082 6c87b10d __fread_nolock 24 API calls 70079->70082 70097 6c87c3d0 24 API calls 2 library calls 70080->70097 70084 6c87fead 70082->70084 70083 6c87fe97 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 70083->70075 70094 6c88a02c 70084->70094 70087 6c87ff57 70098 6c87faf7 29 API calls 4 library calls 70087->70098 70088 6c87ff6e 70088->70083 70099 6c87fca2 28 API calls 2 library calls 70088->70099 70090 6c87ff66 70090->70083 70092->70072 70093->70072 70100 6c88a04a 70094->70100 70097->70083 70098->70090 70099->70083 70101 6c88a056 ___scrt_is_nonwritable_in_current_image 70100->70101 70102 6c88a099 70101->70102 70104 6c88a0df 70101->70104 70110 6c87fecb 70101->70110 70112 6c87c3d0 24 API calls 2 library calls 70102->70112 70111 6c87b941 EnterCriticalSection 70104->70111 70106 6c88a0e5 70107 6c88a106 70106->70107 70108 6c88a16f __fread_nolock 26 API calls 70106->70108 70113 6c88a167 LeaveCriticalSection __wsopen_s 70107->70113 70108->70107 70110->70083 70110->70087 70110->70088 70111->70106 70112->70110 70113->70110 70115 6c6de50b _Yarn 70114->70115 70116 6c87f71f 42 API calls __fread_nolock 70115->70116 70117 6c6deca4 70115->70117 70116->70115 70117->69743 70175 6c6d84fc 70118->70175 70120 6c6d8e6a _Yarn 70121 6c6d8f05 CryptAcquireContextW 70120->70121 70122 6c6d9357 70121->70122 70123 6c6d8f31 CryptImportKey 70121->70123 70202 6c86cc23 27 API calls 3 library calls 70122->70202 70125 6c6d93a5 CryptReleaseContext 70123->70125 70126 6c6d8f75 CryptSetKeyParam 70123->70126 70204 6c86cc23 27 API calls 3 library calls 70125->70204 70128 6c6d8f8d CryptSetKeyParam 70126->70128 70129 6c6d93f8 CryptDestroyKey CryptReleaseContext 70126->70129 70127 6c6d9382 70203 6c86c646 RaiseException 70127->70203 70132 6c6d8fac 70128->70132 70133 6c6d9456 CryptDestroyKey CryptReleaseContext 70128->70133 70206 6c86cc23 27 API calls 3 library calls 70129->70206 70137 6c6d9023 CryptDecrypt CryptDestroyKey CryptReleaseContext 70132->70137 70142 6c6d950a 70132->70142 70147 6c6d8fdd 70132->70147 70148 6c6d8fe8 70132->70148 70208 6c86cc23 27 API calls 3 library calls 70133->70208 70134 6c6d93d5 70205 6c86c646 RaiseException 70134->70205 70136 6c6d939d 70212 6c6d9714 28 API calls 70136->70212 70144 6c6d94b1 70137->70144 70155 6c6d9057 70137->70155 70139 6c6d9433 70207 6c86c646 RaiseException 70139->70207 70141 6c6d9491 70209 6c86c646 RaiseException 70141->70209 70213 6c6d99f8 39 API calls 3 library calls 70142->70213 70210 6c86cc23 27 API calls 3 library calls 70144->70210 70199 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70147->70199 70153 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70148->70153 70151 6c6d94d9 70211 6c86c646 RaiseException 70151->70211 70169 6c6d8fe3 _Yarn 70153->70169 70154 6c6d950f 70214 6c6d99f8 39 API calls 3 library calls 70154->70214 70155->70154 70161 6c6d90ea 70155->70161 70162 6c6d90c0 70155->70162 70173 6c6d9067 std::ios_base::_Ios_base_dtor _Yarn __fread_nolock 70155->70173 70158 6c6d951b 70215 6c6d8792 70158->70215 70159 6c6d91d9 70166 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70159->70166 70160 6c6d91c9 70201 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70160->70201 70168 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70161->70168 70200 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70162->70200 70164 6c6d952a 70164->69606 70171 6c6d9187 std::ios_base::_Ios_base_dtor _Yarn 70166->70171 70168->70173 70169->70137 70170 6c87c237 24 API calls 70170->70122 70171->70170 70172 6c6d932d std::ios_base::_Ios_base_dtor 70171->70172 70172->69606 70173->70136 70173->70159 70173->70160 70173->70171 70174->69611 70176 6c6d8538 70175->70176 70177 6c6d853a CryptStringToBinaryA 70175->70177 70176->70177 70178 6c6d85da 70177->70178 70179 6c6d8553 70177->70179 70264 6c6d864e 27 API calls ___std_exception_copy 70178->70264 70181 6c6d857b __fread_nolock 70179->70181 70188 6c6d857d 70179->70188 70189 6c6d8575 70179->70189 70198 6c6d8632 70179->70198 70182 6c6d85b0 CryptStringToBinaryA 70181->70182 70185 6c6d85f4 70182->70185 70186 6c6d85c7 70182->70186 70183 6c6d85e9 70265 6c86c646 RaiseException 70183->70265 70266 6c86cc23 27 API calls 3 library calls 70185->70266 70186->70120 70190 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70188->70190 70263 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70189->70263 70190->70181 70191 6c6d863a 70194 6c6d8792 55 API calls 70191->70194 70197 6c6d8649 70194->70197 70195 6c6d8617 70267 6c86c646 RaiseException 70195->70267 70197->70120 70268 6c6d99f8 39 API calls 3 library calls 70198->70268 70199->70169 70200->70173 70201->70171 70202->70127 70203->70136 70204->70134 70205->70136 70206->70139 70207->70136 70208->70141 70209->70136 70210->70151 70211->70136 70213->70154 70214->70158 70216 6c6d879d 70215->70216 70217 6c6d87c2 std::ios_base::_Ios_base_dtor 70215->70217 70216->70217 70218 6c87c237 24 API calls 70216->70218 70217->70164 70219 6c6d87e4 CryptAcquireContextW 70218->70219 70220 6c6d8dac 70219->70220 70262 6c6d884f std::ios_base::_Ios_base_dtor _Yarn __fread_nolock 70219->70262 70281 6c86cc23 27 API calls 3 library calls 70220->70281 70222 6c6d8899 CryptCreateHash 70226 6c6d8ce4 CryptReleaseContext 70222->70226 70222->70262 70223 6c6d8abb CryptReleaseContext 70241 6c6d8ada std::ios_base::_Ios_base_dtor 70223->70241 70224 6c6d8dd4 70282 6c86c646 RaiseException 70224->70282 70276 6c86cc23 27 API calls 3 library calls 70226->70276 70228 6c6d8c20 70233 6c6d8792 39 API calls 70228->70233 70229 6c6d88ba CryptHashData 70231 6c6d8d40 CryptDestroyHash CryptReleaseContext 70229->70231 70229->70262 70230 6c6d8d16 70277 6c86c646 RaiseException 70230->70277 70278 6c86cc23 27 API calls 3 library calls 70231->70278 70235 6c6d8e04 70233->70235 70237 6c6d8792 39 API calls 70235->70237 70236 6c6d8d7b 70279 6c86c646 RaiseException 70236->70279 70239 6c6d8e0c 70237->70239 70239->70164 70240 6c6d891d CryptHashData 70244 6c6d8c28 CryptDestroyHash CryptReleaseContext 70240->70244 70245 6c6d893a CryptGetHashParam 70240->70245 70242 6c6d8bb3 std::ios_base::_Ios_base_dtor 70241->70242 70243 6c87c237 24 API calls 70241->70243 70242->70164 70243->70220 70272 6c86cc23 27 API calls 3 library calls 70244->70272 70247 6c6d8c86 CryptDestroyHash CryptReleaseContext 70245->70247 70245->70262 70274 6c86cc23 27 API calls 3 library calls 70247->70274 70248 6c6d8c63 70273 6c86c646 RaiseException 70248->70273 70250 6c6d8a6c CryptGetHashParam CryptDestroyHash 70253 6c6d8bd6 CryptReleaseContext 70250->70253 70250->70262 70252 6c6d8cc1 70275 6c86c646 RaiseException 70252->70275 70270 6c86cc23 27 API calls 3 library calls 70253->70270 70256 6c6d8da2 70280 6c6d99f8 39 API calls 3 library calls 70256->70280 70257 6c6d8c05 70271 6c86c646 RaiseException 70257->70271 70261 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70261->70262 70262->70222 70262->70223 70262->70229 70262->70240 70262->70241 70262->70250 70262->70256 70262->70261 70269 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70262->70269 70263->70181 70264->70183 70265->70185 70266->70195 70267->70198 70268->70191 70269->70262 70270->70257 70271->70228 70272->70248 70273->70228 70274->70252 70275->70228 70276->70230 70277->70228 70278->70236 70279->70228 70280->70241 70281->70224 70282->70228 70283->69628 70284->69634 70287->69626 70289 6c88d71b GetLastError 70288->70289 70290 6c88d72d 70288->70290 70291 6c88d727 __dosmaperr 70289->70291 70290->69644 70291->69644 70292->69650 70293->69679 70294->69686 70295->69696 70296->69693 70302->69712 70304 6c87c260 70303->70304 70307 6c87c288 70304->70307 70308 6c87c2a4 __fread_nolock __FrameHandler3::FrameUnwindToState 70307->70308 70309 6c87c2d0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 70308->70309 70311 6c87c3a1 __FrameHandler3::FrameUnwindToState 70309->70311 70310 6c7c11c4 _ValidateLocalCookies 5 API calls 70312 6c87c275 GetCurrentProcess TerminateProcess 70310->70312 70311->70310 70312->69714 70326 6c6fa489 std::ios_base::_Ios_base_dtor _Yarn _strlen 70313->70326 70314 6c6fa596 _strlen 70316 6c6fa5c3 70314->70316 70395 6c6d9714 28 API calls 70314->70395 70320 6c6fa603 70316->70320 70321 6c6fa612 70316->70321 70324 6c6fa5ca _Yarn 70316->70324 70318 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70318->70326 70396 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70320->70396 70323 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70321->70323 70323->70324 70397 6c6f9d68 30 API calls 4 library calls 70324->70397 70325 6c6fa564 Sleep 70325->70326 70326->70314 70326->70318 70326->70325 70327 6c6fa6a2 70326->70327 70339 6c6f9b7b CreateToolhelp32Snapshot 70326->70339 70394 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70326->70394 70330 6c87c237 24 API calls 70327->70330 70329 6c6fa64f 70329->70327 70331 6c6fa675 std::ios_base::_Ios_base_dtor 70329->70331 70332 6c6fa6a7 70330->70332 70398 6c6dc08c 24 API calls std::ios_base::_Ios_base_dtor 70332->70398 70334 6c6fa6b6 70336 6c6f9b4c 70335->70336 70337 6c6f9b60 Sleep 70336->70337 70338 6c6f9b5e 70336->70338 70337->70336 70340 6c6f9b97 __fread_nolock 70339->70340 70341 6c6f9d44 70339->70341 70342 6c6f9bad Process32FirstW 70340->70342 70341->70326 70343 6c6f9d3d CloseHandle 70342->70343 70361 6c6f9bcd std::ios_base::_Ios_base_dtor _Yarn _strlen 70342->70361 70343->70341 70344 6c6f9bd6 WideCharToMultiByte 70344->70361 70345 6c6f9d5e 70400 6c6d9714 28 API calls 70345->70400 70347 6c6f9d63 70348 6c6f9d68 SHGetFolderPathA 70347->70348 70349 6c87c237 24 API calls 70347->70349 70352 6c6fa35f 70348->70352 70353 6c6f9dbd _strlen 70348->70353 70349->70348 70351 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70351->70361 70352->70326 70354 6c6fa3e1 70353->70354 70357 6c6f9e1e 70353->70357 70358 6c6f9e26 70353->70358 70369 6c6f9de4 _Yarn 70353->70369 70405 6c6d9714 28 API calls 70354->70405 70356 6c6fa3e6 70406 6c6d9714 28 API calls 70356->70406 70401 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70357->70401 70364 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70358->70364 70359 6c6f9d23 Process32NextW 70359->70343 70359->70344 70360 6c6f9d51 CloseHandle 70360->70341 70361->70344 70361->70345 70361->70347 70361->70351 70361->70359 70361->70360 70399 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70361->70399 70364->70369 70365 6c6fa3f2 70407 6c6d9714 28 API calls 70365->70407 70367 6c6fa3fe 70408 6c6d9714 28 API calls 70367->70408 70368 6c6f9eb4 70402 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70368->70402 70369->70356 70369->70368 70374 6c6fa3c4 70369->70374 70379 6c6f9ec4 std::ios_base::_Ios_base_dtor _Yarn 70369->70379 70376 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70374->70376 70376->70379 70377 6c6fa014 70403 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70377->70403 70379->70365 70379->70377 70380 6c6fa3a6 70379->70380 70381 6c6fa3dc 70379->70381 70386 6c6fa024 std::ios_base::_Ios_base_dtor _Yarn 70379->70386 70383 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70380->70383 70382 6c87c237 24 API calls 70381->70382 70382->70354 70383->70386 70384 6c6fa171 70404 6c6d971e 28 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 70384->70404 70386->70367 70386->70381 70386->70384 70387 6c6fa388 70386->70387 70388 6c6fa181 std::ios_base::_Ios_base_dtor _Yarn 70386->70388 70389 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70387->70389 70388->70381 70390 6c6fa2f1 std::ios_base::_Ios_base_dtor 70388->70390 70389->70388 70390->70388 70391 6c6fa31d DeleteFileA 70390->70391 70391->70352 70392 6c6fa32c 70391->70392 70392->70381 70393 6c6fa34e std::ios_base::_Ios_base_dtor 70392->70393 70393->70352 70394->70326 70396->70324 70397->70329 70398->70334 70399->70361 70401->70369 70402->70379 70403->70386 70404->70388 70409 6c6d8474 70410 6c6d847e 70409->70410 70412 6c6d84a0 70410->70412 70413 6c77b4b6 70410->70413 70414 6c77c8b9 Concurrency::details::ExternalContextBase::~ExternalContextBase 71 API calls 70413->70414 70415 6c77b4bf 70414->70415 70416 6c82e632 Concurrency::details::ExternalContextBase::~ExternalContextBase 6 API calls 70415->70416 70417 6c77b4c8 70416->70417 70418 6c7c12dc RaiseException 70417->70418 70419 6c77b4d3 70418->70419 70420 6c82e6a6 Concurrency::details::ExternalContextBase::~ExternalContextBase 2 API calls 70419->70420 70421 6c77b4da 70420->70421 70421->70410 70422 6c70093a 70423 6c700944 70422->70423 70424 6c701262 29 API calls 70423->70424 70425 6c70094e 70424->70425 70426 6c701e5c 70427 6c701e62 70426->70427 70428 6c701e65 70426->70428 70431 6c701e32 70428->70431 70430 6c701e6a DeleteObject 70432 6c701e44 70431->70432 70433 6c701e3d 70431->70433 70432->70430 70435 6c702e58 71 API calls 2 library calls 70433->70435 70435->70432 70436 6c70072c 70441 6c80b3db 70436->70441 70439 6c701262 29 API calls 70440 6c700740 70439->70440 70444 6c80a910 70441->70444 70443 6c700736 70443->70439 70445 6c80a91c __EH_prolog3 70444->70445 70446 6c77fac2 71 API calls 70445->70446 70447 6c80a926 70446->70447 70448 6c82e632 Concurrency::details::ExternalContextBase::~ExternalContextBase 6 API calls 70447->70448 70449 6c80a954 70448->70449 70450 6c80a995 70449->70450 70451 6c80a95d GetProfileIntW GetProfileIntW 70449->70451 70452 6c82e6a6 Concurrency::details::ExternalContextBase::~ExternalContextBase 2 API calls 70450->70452 70451->70450 70453 6c80a99c Concurrency::details::ExternalContextBase::~ExternalContextBase 70452->70453 70453->70443 70454 6c6f82d0 70471 6c6f67ec 70454->70471 70456 6c6f831c 70492 6c6dc0ea 70456->70492 70462 6c6f82e8 70462->70456 70475 6c6f6a5d 70462->70475 70483 6c6f7234 70462->70483 70488 6c6f76c2 70462->70488 70465 6c6dc0ea 37 API calls 70468 6c6f8343 70465->70468 70466 6c6f830f Sleep 70466->70462 70467 6c6f8371 std::ios_base::_Ios_base_dtor 70468->70467 70469 6c87c237 24 API calls 70468->70469 70470 6c6f8398 70469->70470 70472 6c6f6833 70471->70472 70474 6c6f6a55 70472->70474 70509 6c6fcc80 28 API calls 3 library calls 70472->70509 70474->70462 70476 6c6f6a85 70475->70476 70477 6c6dc0ea 37 API calls 70476->70477 70478 6c6f720f 70476->70478 70477->70476 70479 6c6ed432 68 API calls 70478->70479 70480 6c6f721e 70479->70480 70481 6c6dc0ea 37 API calls 70480->70481 70482 6c6f7229 70481->70482 70482->70462 70510 6c87b987 70483->70510 70485 6c6f7244 70487 6c6f76ba 70485->70487 70518 6c87b9d7 17 API calls 2 library calls 70485->70518 70487->70462 70489 6c6f76fe 70488->70489 70491 6c6f7ded 70489->70491 70548 6c6fcc80 28 API calls 3 library calls 70489->70548 70491->70466 70493 6c6dc121 _strlen 70492->70493 70549 6c6e3e3a 70493->70549 70495 6c6e27f4 37 API calls 70496 6c6dc2f0 70495->70496 70553 6c6e40c8 70496->70553 70499 6c6dc13d 70499->70495 70500 6c6ed432 70501 6c6e3e3a 37 API calls 70500->70501 70502 6c6ed46e 70501->70502 70507 6c6ed4a4 70502->70507 70559 6c6e90e0 70502->70559 70503 6c6e27f4 37 API calls 70504 6c6ed574 70503->70504 70505 6c6e40c8 37 API calls 70504->70505 70508 6c6ed57c 70505->70508 70507->70503 70508->70465 70509->70472 70511 6c87b993 ___scrt_is_nonwritable_in_current_image 70510->70511 70519 6c87c939 EnterCriticalSection 70511->70519 70513 6c87b99a 70520 6c87bc45 70513->70520 70518->70485 70519->70513 70521 6c87bc63 70520->70521 70522 6c87bc72 70521->70522 70537 6c88a286 CreateFileW ___initconin 70521->70537 70525 6c7c11c4 _ValidateLocalCookies 5 API calls 70522->70525 70524 6c87bc7f 70524->70522 70538 6c88a2f7 5 API calls ___initconin 70524->70538 70527 6c87b9a8 70525->70527 70534 6c87b9ce 70527->70534 70528 6c87bc90 70528->70522 70531 6c87bcbd __wsopen_s 70528->70531 70533 6c87bcfa 70528->70533 70539 6c883811 70528->70539 70531->70533 70544 6c88a33d 5 API calls ___initconin 70531->70544 70545 6c84e919 RtlFreeHeap GetLastError ___vcrt_freefls@4 70533->70545 70547 6c87c950 LeaveCriticalSection 70534->70547 70536 6c87b9b9 70536->70485 70537->70524 70538->70528 70541 6c88384d 70539->70541 70542 6c88381f __fread_nolock 70539->70542 70540 6c88383a RtlAllocateHeap 70540->70541 70540->70542 70541->70531 70542->70540 70542->70541 70546 6c879b6b EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 70542->70546 70544->70533 70545->70522 70546->70542 70547->70536 70548->70489 70551 6c6e3e7a 70549->70551 70550 6c6e3e8b 70550->70499 70551->70550 70557 6c6e41a8 37 API calls 70551->70557 70554 6c6e40e2 70553->70554 70555 6c6dc2f8 70554->70555 70558 6c6e431e 37 API calls 70554->70558 70555->70500 70557->70550 70558->70554 70560 6c7bef60 std::_Lockit::_Lockit 7 API calls 70559->70560 70561 6c6e911a 70560->70561 70574 6c6e12e2 70561->70574 70563 6c6e9170 70565 6c7bef91 std::_Lockit::~_Lockit 2 API calls 70563->70565 70564 6c6e912f 70564->70563 70579 6c6e91d4 70564->70579 70566 6c6e918c 70565->70566 70566->70507 70569 6c6e919f 70588 6c6e17c2 60 API calls 4 library calls 70569->70588 70570 6c6e915d 70587 6c7bf173 4 API calls 2 library calls 70570->70587 70573 6c6e91a4 70573->70507 70575 6c6e1306 70574->70575 70576 6c7bef91 std::_Lockit::~_Lockit 2 API calls 70575->70576 70577 6c6e1490 70575->70577 70578 6c7bef60 std::_Lockit::_Lockit 7 API calls 70575->70578 70576->70575 70577->70564 70578->70575 70580 6c6e9207 70579->70580 70581 6c6e9155 70579->70581 70580->70581 70582 6c701139 Concurrency::details::ExternalContextBase::~ExternalContextBase 4 API calls 70580->70582 70581->70569 70581->70570 70583 6c6e9216 70582->70583 70589 6c6e17e6 70583->70589 70585 6c6e9245 70612 6c6e1936 70585->70612 70587->70563 70588->70573 70590 6c7bef60 std::_Lockit::_Lockit 7 API calls 70589->70590 70591 6c6e1821 70590->70591 70592 6c6e184e 70591->70592 70593 6c6e1875 70591->70593 70629 6c7bf1f5 70592->70629 70638 6c7bf65f 28 API calls Concurrency::cancel_current_task 70593->70638 70597 6c6e1886 70600 6c6e18a3 70597->70600 70639 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70597->70639 70601 6c6e18bc 70600->70601 70640 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70600->70640 70603 6c6e18d5 70601->70603 70641 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70601->70641 70604 6c6e18ee 70603->70604 70642 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70603->70642 70606 6c6e1907 70604->70606 70643 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70604->70643 70607 6c6e1920 70606->70607 70644 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70606->70644 70610 6c7bef91 std::_Lockit::~_Lockit 2 API calls 70607->70610 70611 6c6e1931 70610->70611 70611->70585 70681 6c7bf241 70612->70681 70615 6c6e1985 70617 6c6e199c 70615->70617 70686 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70615->70686 70619 6c6e19b3 70617->70619 70687 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70617->70687 70621 6c6e19ca 70619->70621 70688 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70619->70688 70623 6c6e19e1 70621->70623 70689 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70621->70689 70625 6c6e19f8 70623->70625 70690 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70623->70690 70627 6c7bef91 std::_Lockit::~_Lockit 2 API calls 70625->70627 70628 6c6e1a09 70627->70628 70628->70581 70645 6c880727 70629->70645 70632 6c7bf25b _Yarn 5 API calls 70633 6c7bf21a 70632->70633 70634 6c7bf229 70633->70634 70635 6c880727 std::_Locinfo::_Locinfo_dtor 56 API calls 70633->70635 70636 6c7bf25b _Yarn 5 API calls 70634->70636 70635->70634 70637 6c6e185c 70636->70637 70637->70585 70638->70597 70639->70600 70640->70601 70641->70603 70642->70604 70643->70606 70644->70607 70650 6c885d46 70645->70650 70647 6c880734 70648 6c880959 std::_Locinfo::_Locinfo_dtor 56 API calls 70647->70648 70649 6c7bf202 70648->70649 70649->70632 70671 6c885ecd 5 API calls std::_Lockit::_Lockit 70650->70671 70652 6c885d4b 70672 6c885ee7 5 API calls std::_Lockit::_Lockit 70652->70672 70654 6c885d50 70673 6c885f01 5 API calls std::_Lockit::_Lockit 70654->70673 70656 6c885d55 70674 6c885f1b 5 API calls std::_Lockit::_Lockit 70656->70674 70658 6c885d5a 70675 6c885f35 5 API calls std::_Lockit::_Lockit 70658->70675 70660 6c885d5f 70676 6c885f4f 5 API calls std::_Lockit::_Lockit 70660->70676 70662 6c885d64 70677 6c885f69 5 API calls std::_Lockit::_Lockit 70662->70677 70664 6c885d69 70678 6c885f83 5 API calls std::_Lockit::_Lockit 70664->70678 70666 6c885d6e 70679 6c885f9d 5 API calls std::_Lockit::_Lockit 70666->70679 70668 6c885d73 70680 6c885fb7 5 API calls std::_Lockit::_Lockit 70668->70680 70670 6c885d78 70670->70670 70671->70652 70672->70654 70673->70656 70674->70658 70675->70660 70676->70662 70677->70664 70678->70666 70679->70668 70680->70670 70682 6c6e1972 70681->70682 70683 6c7bf24d 70681->70683 70682->70615 70685 6c87f915 RtlFreeHeap GetLastError ___free_lconv_mon 70682->70685 70684 6c880727 std::_Locinfo::_Locinfo_dtor 56 API calls 70683->70684 70684->70682 70685->70615 70686->70617 70687->70619 70688->70621 70689->70623 70690->70625

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 6c6d8792-6c6d879b 1 6c6d879d-6c6d87a7 0->1 2 6c6d87db-6c6d87de 0->2 3 6c6d87a9-6c6d87c0 1->3 4 6c6d87c7-6c6d87d8 call 6c70116e 1->4 5 6c6d87df-6c6d8849 call 6c87c237 CryptAcquireContextW 3->5 6 6c6d87c2-6c6d87c5 3->6 4->2 11 6c6d8dac-6c6d8df2 call 6c86cc23 call 6c86c646 5->11 12 6c6d884f-6c6d887c 5->12 6->4 29 6c6d8df5-6c6d8e10 call 6c6d8792 * 2 11->29 13 6c6d887e-6c6d8893 12->13 15 6c6d8899-6c6d88ad CryptCreateHash 13->15 16 6c6d8abb-6c6d8af1 CryptReleaseContext call 6c6d9f40 * 2 13->16 20 6c6d8ce4-6c6d8d3b CryptReleaseContext call 6c86cc23 call 6c86c646 15->20 21 6c6d88b3-6c6d88b8 15->21 40 6c6d8b29-6c6d8b2e 16->40 41 6c6d8af3-6c6d8b07 16->41 20->29 25 6c6d88ba-6c6d88cb CryptHashData 21->25 26 6c6d88d1-6c6d88d7 21->26 25->26 30 6c6d8d40-6c6d8da0 CryptDestroyHash CryptReleaseContext call 6c86cc23 call 6c86c646 25->30 31 6c6d88d9-6c6d88dc 26->31 32 6c6d88e3-6c6d88e9 26->32 30->29 31->32 37 6c6d88ed-6c6d890c call 6c6d9a02 32->37 38 6c6d88eb 32->38 59 6c6d891d-6c6d8934 CryptHashData 37->59 60 6c6d890e-6c6d8918 call 6c6d9bda 37->60 38->37 50 6c6d8b5c-6c6d8b61 40->50 51 6c6d8b30-6c6d8b3a 40->51 45 6c6d8b1f-6c6d8b26 call 6c70116e 41->45 46 6c6d8b09-6c6d8b14 41->46 45->40 54 6c6d8b1a-6c6d8b1d 46->54 55 6c6d8da7 call 6c87c237 46->55 52 6c6d8b8f-6c6d8b94 50->52 53 6c6d8b63-6c6d8b6d 50->53 61 6c6d8b3c-6c6d8b47 51->61 62 6c6d8b52-6c6d8b59 call 6c70116e 51->62 65 6c6d8b96-6c6d8ba0 52->65 66 6c6d8bc2-6c6d8bd5 52->66 63 6c6d8b6f-6c6d8b7a 53->63 64 6c6d8b85-6c6d8b8c call 6c70116e 53->64 54->45 55->11 71 6c6d8c28-6c6d8c81 CryptDestroyHash CryptReleaseContext call 6c86cc23 call 6c86c646 59->71 72 6c6d893a-6c6d8962 CryptGetHashParam 59->72 60->59 61->55 70 6c6d8b4d-6c6d8b50 61->70 62->50 63->55 75 6c6d8b80-6c6d8b83 63->75 64->52 78 6c6d8bb8-6c6d8bbf call 6c70116e 65->78 79 6c6d8ba2-6c6d8bad 65->79 70->62 71->29 80 6c6d8968-6c6d8973 72->80 81 6c6d8c86-6c6d8cdf CryptDestroyHash CryptReleaseContext call 6c86cc23 call 6c86c646 72->81 75->64 78->66 79->55 86 6c6d8bb3-6c6d8bb6 79->86 82 6c6d8975-6c6d8977 80->82 83 6c6d8981 80->83 81->29 89 6c6d897a-6c6d897c 82->89 90 6c6d8a6c-6c6d8a8b CryptGetHashParam CryptDestroyHash 83->90 91 6c6d8987-6c6d898e 83->91 86->78 89->90 98 6c6d8bd6-6c6d8c23 CryptReleaseContext call 6c86cc23 call 6c86c646 90->98 99 6c6d8a91-6c6d8ab6 call 6c6d9d9a 90->99 95 6c6d89dd-6c6d89f2 call 6c86e940 91->95 96 6c6d8990-6c6d8998 91->96 95->89 102 6c6d899e-6c6d89d0 96->102 103 6c6d8da2 call 6c6d99f8 96->103 98->29 99->13 108 6c6d89f4-6c6d89fa call 6c701139 102->108 109 6c6d89d2-6c6d89db call 6c6d971e 102->109 103->55 119 6c6d89fd-6c6d8a2e call 6c86e940 call 6c86e3c0 108->119 109->119 124 6c6d8a5c-6c6d8a69 119->124 125 6c6d8a30-6c6d8a3a 119->125 124->90 126 6c6d8a3c-6c6d8a47 125->126 127 6c6d8a52-6c6d8a59 call 6c70116e 125->127 126->55 128 6c6d8a4d-6c6d8a50 126->128 127->124 128->127
                                                    APIs
                                                    • CryptAcquireContextW.ADVAPI32 ref: 6C6D8841
                                                    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 6C6D88A5
                                                    • CryptHashData.ADVAPI32(?,?,00000000,00000000), ref: 6C6D88C3
                                                    • CryptHashData.ADVAPI32(?,?,?,00000000,?,?,?), ref: 6C6D892C
                                                    • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 6C6D8954
                                                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 6C6D8A78
                                                    • CryptDestroyHash.ADVAPI32(?), ref: 6C6D8A83
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C6D8ABE
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C6D8BDC
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D8C00
                                                    • CryptDestroyHash.ADVAPI32(?), ref: 6C6D8C2B
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C6D8C37
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D8C5E
                                                      • Part of subcall function 6C86C646: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C6D971E,?,?,?,6C7BF63E,6C6D971E,6C901A88,?,6C6D971E,string too long,6C6FA5A2), ref: 6C86C6A7
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D8DCF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Crypt$Hash$Context$Release___std_exception_copy$DataDestroyParam$AcquireCreateExceptionRaise
                                                    • String ID:
                                                    • API String ID: 3252232363-3916222277
                                                    • Opcode ID: 4d8f17a8f39ad5388b3cec79b2f1123b92d22a0edffb5123b4540ceb8b866c9f
                                                    • Instruction ID: af77eed15eed4acc6555fab80c89add63823b3ce6b0dc39e6420a59fed13bea2
                                                    • Opcode Fuzzy Hash: 4d8f17a8f39ad5388b3cec79b2f1123b92d22a0edffb5123b4540ceb8b866c9f
                                                    • Instruction Fuzzy Hash: B712E5B2E002189FDB14CFA8CD48AEEBBB9FF89304F15852AE415E7750D730A944CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 131 6c6d8e2d-6c6d8e82 call 6c6d84fc 134 6c6d8e84-6c6d8e95 131->134 135 6c6d8ed2-6c6d8f2b call 6c6d87e4 CryptAcquireContextW 131->135 134->135 136 6c6d8e97-6c6d8ed0 call 6c6d9d9a call 6c86e3c0 134->136 141 6c6d9357-6c6d93a0 call 6c86cc23 call 6c86c646 135->141 142 6c6d8f31-6c6d8f6f CryptImportKey 135->142 136->135 164 6c6d94fe-6c6d9505 call 6c6d9714 141->164 144 6c6d93a5-6c6d93f3 CryptReleaseContext call 6c86cc23 call 6c86c646 142->144 145 6c6d8f75-6c6d8f87 CryptSetKeyParam 142->145 144->164 148 6c6d8f8d-6c6d8fa6 CryptSetKeyParam 145->148 149 6c6d93f8-6c6d9451 CryptDestroyKey CryptReleaseContext call 6c86cc23 call 6c86c646 145->149 153 6c6d8fac-6c6d8fca 148->153 154 6c6d9456-6c6d94af CryptDestroyKey CryptReleaseContext call 6c86cc23 call 6c86c646 148->154 149->164 158 6c6d8fcc 153->158 159 6c6d9023-6c6d9051 CryptDecrypt CryptDestroyKey CryptReleaseContext 153->159 154->164 165 6c6d950a call 6c6d99f8 158->165 166 6c6d8fd2-6c6d8fdb 158->166 169 6c6d9057-6c6d9065 159->169 170 6c6d94b1-6c6d94fb call 6c86cc23 call 6c86c646 159->170 164->165 186 6c6d950f-6c6d952e call 6c6d99f8 call 6c6d8792 165->186 175 6c6d8fdd-6c6d8fe6 call 6c6d971e 166->175 176 6c6d8fe8-6c6d8fee call 6c701139 166->176 171 6c6d9067-6c6d906e 169->171 172 6c6d9073 169->172 170->164 180 6c6d9169-6c6d917c 171->180 172->180 181 6c6d9079-6c6d9080 172->181 196 6c6d8ff1-6c6d9020 call 6c86e3c0 175->196 176->196 180->164 192 6c6d9182-6c6d9185 180->192 187 6c6d90d2-6c6d90e8 call 6c86e940 181->187 188 6c6d9082-6c6d908a 181->188 187->180 188->186 194 6c6d9090-6c6d90be 188->194 198 6c6d9187-6c6d919e call 6c86e3c0 192->198 199 6c6d91a0-6c6d91c7 192->199 203 6c6d90ea-6c6d90f7 call 6c701139 194->203 204 6c6d90c0-6c6d90d0 call 6c6d971e 194->204 196->159 220 6c6d9205-6c6d920d 198->220 201 6c6d91d9-6c6d91e4 call 6c701139 199->201 202 6c6d91c9-6c6d91d7 call 6c6d971e 199->202 221 6c6d91e7-6c6d9203 call 6c86e3c0 201->221 202->221 222 6c6d90fa-6c6d9128 call 6c86e940 call 6c86e3c0 203->222 204->222 223 6c6d920f-6c6d9219 220->223 224 6c6d923b-6c6d9240 220->224 221->220 259 6c6d912a-6c6d9134 222->259 260 6c6d9156-6c6d9166 222->260 228 6c6d921b-6c6d9226 223->228 229 6c6d9231-6c6d9238 call 6c70116e 223->229 225 6c6d9287-6c6d928c 224->225 226 6c6d9242-6c6d9256 224->226 234 6c6d92cc-6c6d92d1 225->234 235 6c6d928e-6c6d9298 225->235 232 6c6d9258-6c6d9263 226->232 233 6c6d9276-6c6d9280 call 6c70116e 226->233 237 6c6d922c-6c6d922f 228->237 238 6c6d9352 call 6c87c237 228->238 229->224 232->238 241 6c6d9269-6c6d9274 232->241 233->225 246 6c6d930d-6c6d9312 234->246 247 6c6d92d3-6c6d92dd 234->247 243 6c6d92bb-6c6d92c5 call 6c70116e 235->243 244 6c6d929a-6c6d92b0 235->244 237->229 238->141 241->233 243->234 244->238 255 6c6d92b6-6c6d92b9 244->255 253 6c6d933c-6c6d9351 246->253 254 6c6d9314-6c6d931e 246->254 249 6c6d92fc-6c6d9306 call 6c70116e 247->249 250 6c6d92df-6c6d92f5 247->250 249->246 250->238 257 6c6d92f7-6c6d92fa 250->257 261 6c6d9320-6c6d932b 254->261 262 6c6d9332-6c6d9339 call 6c70116e 254->262 255->243 257->249 265 6c6d914c-6c6d9153 call 6c70116e 259->265 266 6c6d9136-6c6d9141 259->266 260->180 261->238 267 6c6d932d-6c6d9330 261->267 262->253 265->260 266->238 269 6c6d9147-6c6d914a 266->269 267->262 269->265
                                                    APIs
                                                      • Part of subcall function 6C6D84FC: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C6D8545
                                                      • Part of subcall function 6C6D84FC: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C6D85BD
                                                    • CryptAcquireContextW.ADVAPI32 ref: 6C6D8F23
                                                    • CryptImportKey.ADVAPI32(?,?,00000014,00000000,00000000,?), ref: 6C6D8F67
                                                    • CryptSetKeyParam.ADVAPI32(?,00000001,?,00000000), ref: 6C6D8F7F
                                                    • CryptSetKeyParam.ADVAPI32(?,00000004,?,00000000), ref: 6C6D8F9E
                                                    • CryptDecrypt.ADVAPI32(?,00000000,00000001,00000000,?,?), ref: 6C6D9034
                                                    • CryptDestroyKey.ADVAPI32(?,?,?), ref: 6C6D903F
                                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?), ref: 6C6D9049
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D937D
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C6D93A9
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D93D0
                                                    • CryptDestroyKey.ADVAPI32(?), ref: 6C6D93FB
                                                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C6D9407
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D942E
                                                      • Part of subcall function 6C86C646: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C6D971E,?,?,?,6C7BF63E,6C6D971E,6C901A88,?,6C6D971E,string too long,6C6FA5A2), ref: 6C86C6A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Crypt$Context$Release___std_exception_copy$BinaryDestroyParamString$AcquireDecryptExceptionImportRaise
                                                    • String ID: Salt$ed__
                                                    • API String ID: 2404961614-3701620873
                                                    • Opcode ID: 178ea8f6e0a5b81fb7cd3df9ea54a595a1fad2326f3af08b669416cdd4292536
                                                    • Instruction ID: ac605f6c0726962114739c63f5e452cb9426c2e2dedfb74eb0da98ac326aae0d
                                                    • Opcode Fuzzy Hash: 178ea8f6e0a5b81fb7cd3df9ea54a595a1fad2326f3af08b669416cdd4292536
                                                    • Instruction Fuzzy Hash: DF22E3B2E012149FDB14CF68CD54BAEBBB9FF89308F15862DE415A7740EB31A944CB94
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C6F9B89
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 6C6F9BC0
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000,?,00000002,00000000), ref: 6C6F9BEE
                                                    • _strlen.LIBCMT ref: 6C6F9C05
                                                    • Process32NextW.KERNEL32(?,?), ref: 6C6F9D30
                                                    • CloseHandle.KERNELBASE(00000000,?,00000002,00000000), ref: 6C6F9D3E
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 6C6F9D54
                                                    • SHGetFolderPathA.SHELL32 ref: 6C6F9DAF
                                                    • _strlen.LIBCMT ref: 6C6F9DCD
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess32_strlen$ByteCharCreateFirstFolderMultiNextPathSnapshotToolhelp32Wide
                                                    • String ID:
                                                    • API String ID: 2690550405-0
                                                    • Opcode ID: 99124e7bfc8c7f5d66213553d5c53fb02dae8e2b872a908342106c8d29f9b966
                                                    • Instruction ID: 8e3675d12fbfa6ac3a687b5ef817a2cd61640771bac0868b1159e7a728a6ae82
                                                    • Opcode Fuzzy Hash: 99124e7bfc8c7f5d66213553d5c53fb02dae8e2b872a908342106c8d29f9b966
                                                    • Instruction Fuzzy Hash: 5D120872E012048BDB24CF68D9807DEB7F6EF89318F244628E425E7781E7719D858B95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AttributesFileFolderPath_strlen
                                                    • String ID:
                                                    • API String ID: 2493468659-0
                                                    • Opcode ID: 1768e43a0643363079c76998926a85d20acfce9fde1cd7dc2800e6c29dc8e3c1
                                                    • Instruction ID: 0814f7cfbcd312d3151004b245ff7b66a49ff0fbd750ce500fa3b8baca46946a
                                                    • Opcode Fuzzy Hash: 1768e43a0643363079c76998926a85d20acfce9fde1cd7dc2800e6c29dc8e3c1
                                                    • Instruction Fuzzy Hash: 2442C6B1E002188FDB14CF68CC847DEBBB6BF89318F144668E429A7781DB749985CB55

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 806 6c6fb7a1-6c6fb7a7 807 6c6fb7ad-6c6fb7c1 806->807 808 6c6fbce0-6c6fbce7 call 6c6d9714 806->808 809 6c6fb7ed-6c6fb802 807->809 810 6c6fb7c3-6c6fb7ca 807->810 814 6c6fbcec-6c6fbd0b call 6c6d9714 call 6c6dc08c 808->814 812 6c6fb827-6c6fb834 call 6c6d971e 809->812 813 6c6fb804-6c6fb813 809->813 810->812 823 6c6fb837-6c6fb83f 812->823 815 6c6fb819-6c6fb821 813->815 816 6c6fbbf0-6c6fbbf5 813->816 815->812 819 6c6fbbfa-6c6fbc0a call 6c701139 815->819 821 6c6fb842-6c6fb84e 816->821 819->823 824 6c6fb8a3-6c6fb8bf call 6c86e3c0 821->824 825 6c6fb850-6c6fb87b call 6c86e3c0 821->825 823->821 836 6c6fb8d1-6c6fb91b call 6c6f9168 824->836 834 6c6fb87d-6c6fb896 825->834 835 6c6fb8c1 825->835 837 6c6fb89c-6c6fb8a1 834->837 838 6c6fbcdb call 6c87c237 834->838 839 6c6fb8c4-6c6fb8ce call 6c70116e 835->839 846 6c6fb91d-6c6fb929 836->846 847 6c6fb953-6c6fb966 call 6c6fbd9e 836->847 837->839 838->808 839->836 849 6c6fb92b-6c6fb936 846->849 850 6c6fb949-6c6fb950 call 6c70116e 846->850 855 6c6fbafe-6c6fbb05 847->855 856 6c6fb96c-6c6fb995 call 6c6f9828 call 6c6fb195 847->856 849->838 852 6c6fb93c-6c6fb947 849->852 850->847 852->850 857 6c6fbb07-6c6fbb27 call 6c6fa6cf 855->857 858 6c6fbb40-6c6fbb54 CreateThread 855->858 875 6c6fb9bf-6c6fb9d4 856->875 876 6c6fb997-6c6fb99d 856->876 868 6c6fbb2e-6c6fbb3a CreateThread 857->868 869 6c6fbb29 857->869 862 6c6fbb5a-6c6fbb6d WaitForSingleObject 858->862 863 6c6fbc35-6c6fbcd6 call 6c6fb3ef call 6c6fb0de call 6c6f83fc call 6c6fb654 call 6c6dc08c call 6c6da138 call 6c6f9953 CreateThread call 6c6f86c6 call 6c879c1f 858->863 862->863 867 6c6fbb73-6c6fbb80 CloseHandle 862->867 863->838 872 6c6fbbbc-6c6fbbd4 867->872 873 6c6fbb82-6c6fbb98 867->873 868->858 869->868 877 6c6fbb9a-6c6fbba5 873->877 878 6c6fbbb2-6c6fbbb9 call 6c70116e 873->878 880 6c6fb9d9-6c6fb9e9 875->880 881 6c6fb9d6 875->881 876->814 883 6c6fb9a3-6c6fb9b4 876->883 877->838 884 6c6fbbab-6c6fbbb0 877->884 878->872 886 6c6fbaa2-6c6fbacf call 6c88067e 880->886 881->880 888 6c6fb9ee-6c6fba01 883->888 889 6c6fb9b6-6c6fb9bd 883->889 884->878 886->855 901 6c6fbad1-6c6fbada 886->901 890 6c6fba07-6c6fba17 call 6c6d971e 888->890 891 6c6fbbd5-6c6fbbe4 888->891 889->890 910 6c6fba1a-6c6fba22 890->910 894 6c6fbc0f-6c6fbc17 891->894 895 6c6fbbe6-6c6fbbeb 891->895 894->890 899 6c6fbc1d-6c6fbc30 call 6c701139 894->899 900 6c6fba25-6c6fba31 895->900 899->910 904 6c6fba83-6c6fba98 call 6c86e3c0 900->904 905 6c6fba33-6c6fba5b call 6c86e3c0 900->905 907 6c6fbadc-6c6fbae7 901->907 908 6c6fbaf4-6c6fbafb call 6c70116e 901->908 924 6c6fba9f 904->924 922 6c6fba5d-6c6fba6a 905->922 923 6c6fba77-6c6fba81 call 6c70116e 905->923 907->838 915 6c6fbaed-6c6fbaf2 907->915 908->855 910->900 915->908 922->838 926 6c6fba70-6c6fba75 922->926 923->924 924->886 926->923
                                                    APIs
                                                      • Part of subcall function 6C6FBD9E: _strlen.LIBCMT ref: 6C6FBE19
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_0002A446,6C911034,00000000,00000000), ref: 6C6FBB3A
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00029B35,00000000,00000000,00000000), ref: 6C6FBB4C
                                                    • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C6FBB62
                                                    • CloseHandle.KERNELBASE(00000000), ref: 6C6FBB74
                                                      • Part of subcall function 6C6FB195: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C6FB1D3
                                                      • Part of subcall function 6C6FB195: _strlen.LIBCMT ref: 6C6FB1E7
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00029B14,00000000,00000000,00000000), ref: 6C6FBCC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CreateThread$_strlen$CloseFileHandleModuleNameObjectSingleWait
                                                    • String ID: yyzyBase.dll
                                                    • API String ID: 3308770556-3796944409
                                                    • Opcode ID: 1c087b78c94a0bcc03b9559b9fa98ebdd4452232f192dca436922c59c61d8854
                                                    • Instruction ID: 1d3a87a598ca0c229483f52516fa8813395f8129246611aef54faeabbd68440f
                                                    • Opcode Fuzzy Hash: 1c087b78c94a0bcc03b9559b9fa98ebdd4452232f192dca436922c59c61d8854
                                                    • Instruction Fuzzy Hash: 04E1F6B1D001189BDB14CFA4CC94BEEB7B6FF85308F144628E425A7780EB74A946CB99

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 946 6c6fabef-6c6fac4c 947 6c6fad16-6c6fad22 946->947 948 6c6fac52-6c6fac60 946->948 949 6c6fad2c 947->949 950 6c6fad24-6c6fad2a 947->950 951 6c6fac66-6c6fac7d 948->951 952 6c6fb051-6c6fb073 call 6c6d9714 call 6c6dc08c 948->952 954 6c6fad32-6c6fad3e 949->954 950->954 955 6c6fac7f-6c6fac8b 951->955 956 6c6fac91-6c6faca1 call 6c6d971e 951->956 960 6c6fadb5-6c6fadd6 954->960 955->956 957 6c6fad62-6c6fad71 955->957 970 6c6faca4-6c6facaa 956->970 961 6c6fad77-6c6fad7c 957->961 962 6c6faef5-6c6faf04 957->962 964 6c6fae1d-6c6fae23 960->964 965 6c6fadd8-6c6fade7 960->965 969 6c6facad-6c6facbf 961->969 962->956 971 6c6faf0a-6c6faf16 call 6c701139 962->971 967 6c6fae55-6c6fae59 964->967 968 6c6fae25-6c6fae31 964->968 972 6c6fade9-6c6fae00 965->972 973 6c6fae13-6c6fae1a call 6c70116e 965->973 979 6c6fae5b-6c6fae5e 967->979 980 6c6fae60 967->980 975 6c6fae4b-6c6fae52 call 6c70116e 968->975 976 6c6fae33-6c6fae3e 968->976 977 6c6facc1-6c6facf0 call 6c86e3c0 969->977 978 6c6fad40-6c6fad60 call 6c86e3c0 969->978 970->969 971->970 982 6c6fb01c-6c6fb04c call 6c87c237 call 6c6d9714 * 4 972->982 983 6c6fae06-6c6fae11 972->983 973->964 975->967 976->982 986 6c6fae44-6c6fae49 976->986 1003 6c6facf6-6c6fad06 977->1003 1004 6c6fada0 977->1004 999 6c6fadaf 978->999 989 6c6fae63-6c6fae6d GetFileAttributesA 979->989 980->989 982->952 983->973 986->975 997 6c6faf5b-6c6faf61 989->997 998 6c6fae73-6c6fae95 CoInitialize CoCreateInstance 989->998 1000 6c6faf93-6c6faf99 997->1000 1001 6c6faf63-6c6faf6f 997->1001 1005 6c6fae9b-6c6fae9f 998->1005 1006 6c6faf55 CoUninitialize 998->1006 999->960 1011 6c6fafcd-6c6fafe0 1000->1011 1012 6c6faf9b-6c6fafa7 1000->1012 1007 6c6faf89-6c6faf90 call 6c70116e 1001->1007 1008 6c6faf71-6c6faf7c 1001->1008 1003->982 1013 6c6fad0c-6c6fad11 1003->1013 1010 6c6fada3-6c6fadad call 6c70116e 1004->1010 1014 6c6faea6 1005->1014 1015 6c6faea1-6c6faea4 1005->1015 1006->997 1007->1000 1008->982 1016 6c6faf82-6c6faf87 1008->1016 1010->999 1020 6c6fafa9-6c6fafb4 1012->1020 1021 6c6fafc3-6c6fafca call 6c70116e 1012->1021 1013->1010 1022 6c6faea9-6c6faee8 MultiByteToWideChar 1014->1022 1015->1022 1016->1007 1020->982 1026 6c6fafb6-6c6fafc1 1020->1026 1021->1011 1034 6c6faf4c-6c6faf51 1022->1034 1035 6c6faeea-6c6faeee 1022->1035 1026->1021 1034->1006 1036 6c6faf1b 1035->1036 1037 6c6faef0-6c6faef3 1035->1037 1038 6c6faf1e-6c6faf48 MultiByteToWideChar 1036->1038 1037->1038 1038->1034
                                                    APIs
                                                    • GetFileAttributesA.KERNELBASE(?), ref: 6C6FAE64
                                                    • CoInitialize.OLE32(00000000), ref: 6C6FAE76
                                                    • CoCreateInstance.OLE32(6C8BBA78,00000000,00000001,6C8AB940,?), ref: 6C6FAE8D
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 6C6FAEBC
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C6FAF31
                                                    • CoUninitialize.COMBASE ref: 6C6FAF55
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AttributesCreateFileInitializeInstanceUninitialize
                                                    • String ID:
                                                    • API String ID: 3761015954-0
                                                    • Opcode ID: 36566b4c4f57b1c80eec6c954665159e645f67915bf719867a87d7b4a51a945c
                                                    • Instruction ID: a6a29070e23f625911addc4bcaf16862979c846ed6bf6fa1d8dc028502c88832
                                                    • Opcode Fuzzy Hash: 36566b4c4f57b1c80eec6c954665159e645f67915bf719867a87d7b4a51a945c
                                                    • Instruction Fuzzy Hash: 30C1B4B1E011148FDB14CF68CC98BEDBBB6FF45318F144668E429AB781DB349986CB64
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367565391.000000000049F000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000004.00000002.2367451405.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000004.00000002.2367466556.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000004.00000002.2367485308.000000000040C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000004.00000002.2367485308.0000000000414000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000004.00000002.2367485308.0000000000456000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_400000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: eda3440530c695fabe89684c08ced21f14d361cbd0f309897fafc30276024117
                                                    • Instruction ID: 43da5d217c0980cd259a2d2a29eecca7fa398e6e45ce52ccb5a58d6b0a96cd39
                                                    • Opcode Fuzzy Hash: eda3440530c695fabe89684c08ced21f14d361cbd0f309897fafc30276024117
                                                    • Instruction Fuzzy Hash:

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 273 6c7c138e-6c7c13b0 EnterCriticalSection 274 6c7c13c6-6c7c13c9 273->274 275 6c7c13b2-6c7c13b6 273->275 278 6c7c13cb-6c7c13ce 274->278 279 6c7c13f6-6c7c13f8 274->279 276 6c7c13bc-6c7c13c0 275->276 277 6c7c14cb 275->277 276->274 281 6c7c1487-6c7c148d 276->281 280 6c7c14ce-6c7c14f6 LeaveCriticalSection call 6c77e7a8 EnterCriticalSection 277->280 278->277 282 6c7c13d4-6c7c13d9 278->282 283 6c7c13f9-6c7c1402 279->283 298 6c7c14f8-6c7c14fb 280->298 299 6c7c1547 280->299 286 6c7c148f 281->286 287 6c7c1492-6c7c14ac LeaveCriticalSection 281->287 285 6c7c13dc-6c7c13df 282->285 288 6c7c1419-6c7c1426 GlobalHandle 283->288 289 6c7c1404-6c7c1417 call 6c71589a GlobalAlloc 283->289 293 6c7c13e9-6c7c13eb 285->293 294 6c7c13e1-6c7c13e7 285->294 286->287 290 6c7c142c-6c7c1448 GlobalUnlock call 6c71589a GlobalReAlloc 288->290 291 6c7c14ad-6c7c14b0 288->291 303 6c7c144e-6c7c1450 289->303 290->303 301 6c7c14c5-6c7c14c9 291->301 302 6c7c14b2-6c7c14bc GlobalHandle 291->302 293->281 300 6c7c13f1-6c7c13f4 293->300 294->285 294->293 298->299 306 6c7c14fd-6c7c1502 298->306 304 6c7c1548-6c7c1552 LeaveCriticalSection 299->304 300->283 301->280 302->301 307 6c7c14be-6c7c14bf GlobalLock 302->307 303->291 310 6c7c1452-6c7c1460 GlobalLock 303->310 308 6c7c153a-6c7c1545 306->308 309 6c7c1504-6c7c1507 306->309 307->301 308->304 312 6c7c1509-6c7c1514 309->312 313 6c7c1530-6c7c1535 309->313 310->301 311 6c7c1462-6c7c1485 call 6c86e940 310->311 311->281 314 6c7c1529-6c7c152c 312->314 315 6c7c1516-6c7c1524 312->315 313->309 317 6c7c1537 313->317 314->313 315->314 317->308
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(6C914114,?,?,?,6C9140F8,6C9140F8,?,6C7C1752,00000004,6C77C8C8,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C7C139F
                                                    • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6C9140F8,6C9140F8,?,6C7C1752,00000004,6C77C8C8,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C7C1411
                                                    • GlobalHandle.KERNEL32(6C914108), ref: 6C7C141B
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C7C142D
                                                    • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 6C7C1448
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C7C1453
                                                    • LeaveCriticalSection.KERNEL32(6C914114), ref: 6C7C14A0
                                                    • GlobalHandle.KERNEL32(6C914108), ref: 6C7C14B4
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C7C14BF
                                                    • LeaveCriticalSection.KERNEL32(6C914114,?,?,?,6C9140F8,6C9140F8,?,6C7C1752,00000004,6C77C8C8,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C7C14CE
                                                    • EnterCriticalSection.KERNEL32(6C6D14F3,6C9140F8,00000001,6C914108,?,?,?,?,?,?,6C9140F8,6C9140F8,?,6C7C1752,00000004,6C77C8C8), ref: 6C7C14EB
                                                    • LeaveCriticalSection.KERNEL32(6C6D14F3,?,?,?,?,?,?,6C9140F8,6C9140F8,?,6C7C1752,00000004,6C77C8C8,6C75EE4E,6C77FACA), ref: 6C7C1548
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$CriticalSection$Leave$AllocEnterHandleLock$Unlock
                                                    • String ID:
                                                    • API String ID: 2233717024-0
                                                    • Opcode ID: f789349cb4ea8f36f74942b3ff45313383534944858606207a6f08021715374d
                                                    • Instruction ID: 76751dee89348648b32da5e80f07d5cc6999c18c42a1fbe4ce84adf8b3dad0cb
                                                    • Opcode Fuzzy Hash: f789349cb4ea8f36f74942b3ff45313383534944858606207a6f08021715374d
                                                    • Instruction Fuzzy Hash: 9E51BD71B0060AEFDB10CF68D988F9AB7B8FF01359B204179E426D7A40DB74EA41CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 737 6c89313e-6c89316e call 6c8935d8 740 6c893189-6c893195 call 6c87b5bd 737->740 741 6c893170-6c89317b call 6c86f989 737->741 747 6c8931ae-6c8931f7 call 6c893543 740->747 748 6c893197-6c8931ac call 6c86f989 call 6c86f976 740->748 746 6c89317d-6c893184 call 6c86f976 741->746 758 6c893463-6c893467 746->758 756 6c8931f9-6c893202 747->756 757 6c893264-6c89326d GetFileType 747->757 748->746 762 6c893239-6c89325f GetLastError call 6c86f99c 756->762 763 6c893204-6c893208 756->763 759 6c89326f-6c8932a0 GetLastError call 6c86f99c CloseHandle 757->759 760 6c8932b6-6c8932b9 757->760 759->746 774 6c8932a6-6c8932b1 call 6c86f976 759->774 765 6c8932bb-6c8932c0 760->765 766 6c8932c2-6c8932c8 760->766 762->746 763->762 767 6c89320a-6c893237 call 6c893543 763->767 771 6c8932cc-6c89331a call 6c87b761 765->771 770 6c8932ca 766->770 766->771 767->757 767->762 770->771 780 6c893339-6c893361 call 6c8937fc 771->780 781 6c89331c-6c893328 call 6c893752 771->781 774->746 787 6c893363-6c893364 780->787 788 6c893366-6c8933a7 780->788 781->780 786 6c89332a 781->786 789 6c89332c-6c893334 call 6c88bab0 786->789 787->789 790 6c8933a9-6c8933ad 788->790 791 6c8933c8-6c8933d6 788->791 789->758 790->791 793 6c8933af-6c8933c3 790->793 794 6c8933dc-6c8933e0 791->794 795 6c893461 791->795 793->791 794->795 797 6c8933e2-6c893415 CloseHandle call 6c893543 794->797 795->758 800 6c893449-6c89345d 797->800 801 6c893417-6c893443 GetLastError call 6c86f99c call 6c87b6d0 797->801 800->795 801->800
                                                    APIs
                                                      • Part of subcall function 6C893543: CreateFileW.KERNELBASE(?,00000000,?,6C8931E7,?,?,00000000,?,6C8931E7,?,0000000C), ref: 6C893560
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C893252
                                                    • __dosmaperr.LIBCMT ref: 6C893259
                                                    • GetFileType.KERNELBASE(00000000), ref: 6C893265
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C89326F
                                                    • __dosmaperr.LIBCMT ref: 6C893278
                                                    • CloseHandle.KERNEL32(00000000), ref: 6C893298
                                                    • CloseHandle.KERNEL32(6C88A23C), ref: 6C8933E5
                                                    • GetLastError.KERNEL32 ref: 6C893417
                                                    • __dosmaperr.LIBCMT ref: 6C89341E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                    • String ID:
                                                    • API String ID: 4237864984-0
                                                    • Opcode ID: 894fe0626502eb3a721f65edf0d9d02cdeed435325801056f211ef965df4f3d6
                                                    • Instruction ID: 8b4b581e4c536152141979f09a36d80707459126aabdb710198ca8db4349d708
                                                    • Opcode Fuzzy Hash: 894fe0626502eb3a721f65edf0d9d02cdeed435325801056f211ef965df4f3d6
                                                    • Instruction Fuzzy Hash: 8EA12532A082589FCF29DF6CD942BAE3BB1AB07328F18055DF8159B790C7359D16C751

                                                    Control-flow Graph

                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C80A917
                                                      • Part of subcall function 6C82E632: EnterCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E663
                                                      • Part of subcall function 6C82E632: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E679
                                                      • Part of subcall function 6C82E632: LeaveCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E687
                                                      • Part of subcall function 6C82E632: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E694
                                                    • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C80A96A
                                                    • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C80A980
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                                    • String ID: DragDelay$DragMinDist$windows
                                                    • API String ID: 3965097884-2101198082
                                                    • Opcode ID: 131852f7c376f9be76f6e2bed1923ab906b93860a914d4df337a4f847e7936a0
                                                    • Instruction ID: b32abc0f045f1f1da31b1f13d00f41aa278350520cc1efb2badc4c6bee7354a2
                                                    • Opcode Fuzzy Hash: 131852f7c376f9be76f6e2bed1923ab906b93860a914d4df337a4f847e7936a0
                                                    • Instruction Fuzzy Hash: 120129B0A247009FDB719F788A4AB1A7AF0BB89709F500D2EE049D6F40D374A444CF45

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1040 6c88cea2-6c88ceb2 1041 6c88cecc-6c88cece 1040->1041 1042 6c88ceb4-6c88cec7 call 6c86f989 call 6c86f976 1040->1042 1043 6c88d20e-6c88d21b call 6c86f989 call 6c86f976 1041->1043 1044 6c88ced4-6c88ceda 1041->1044 1056 6c88d226 1042->1056 1061 6c88d221 call 6c87c227 1043->1061 1044->1043 1047 6c88cee0-6c88cf09 1044->1047 1047->1043 1051 6c88cf0f-6c88cf18 1047->1051 1054 6c88cf1a-6c88cf2d call 6c86f989 call 6c86f976 1051->1054 1055 6c88cf32-6c88cf34 1051->1055 1054->1061 1059 6c88d20a-6c88d20c 1055->1059 1060 6c88cf3a-6c88cf3e 1055->1060 1062 6c88d229-6c88d22c 1056->1062 1059->1062 1060->1059 1064 6c88cf44-6c88cf48 1060->1064 1061->1056 1064->1054 1067 6c88cf4a-6c88cf61 1064->1067 1069 6c88cf63-6c88cf66 1067->1069 1070 6c88cf96-6c88cf9c 1067->1070 1071 6c88cf68-6c88cf6e 1069->1071 1072 6c88cf8c-6c88cf94 1069->1072 1073 6c88cf9e-6c88cfa5 1070->1073 1074 6c88cf70-6c88cf87 call 6c86f989 call 6c86f976 call 6c87c227 1070->1074 1071->1072 1071->1074 1076 6c88d009-6c88d028 1072->1076 1077 6c88cfa9-6c88cfc7 call 6c883811 call 6c8837d7 * 2 1073->1077 1078 6c88cfa7 1073->1078 1105 6c88d141 1074->1105 1080 6c88d02e-6c88d03a 1076->1080 1081 6c88d0e4-6c88d0ed call 6c890a7f 1076->1081 1109 6c88cfc9-6c88cfdf call 6c86f976 call 6c86f989 1077->1109 1110 6c88cfe4-6c88d007 call 6c889fce 1077->1110 1078->1077 1080->1081 1085 6c88d040-6c88d042 1080->1085 1093 6c88d15e 1081->1093 1094 6c88d0ef-6c88d101 1081->1094 1085->1081 1089 6c88d048-6c88d069 1085->1089 1089->1081 1095 6c88d06b-6c88d081 1089->1095 1098 6c88d162-6c88d178 ReadFile 1093->1098 1094->1093 1100 6c88d103-6c88d112 GetConsoleMode 1094->1100 1095->1081 1096 6c88d083-6c88d085 1095->1096 1096->1081 1101 6c88d087-6c88d0aa 1096->1101 1103 6c88d17a-6c88d180 1098->1103 1104 6c88d1d6-6c88d1e1 GetLastError 1098->1104 1100->1093 1106 6c88d114-6c88d118 1100->1106 1101->1081 1108 6c88d0ac-6c88d0c2 1101->1108 1103->1104 1113 6c88d182 1103->1113 1111 6c88d1fa-6c88d1fd 1104->1111 1112 6c88d1e3-6c88d1f5 call 6c86f976 call 6c86f989 1104->1112 1107 6c88d144-6c88d14e call 6c8837d7 1105->1107 1106->1098 1114 6c88d11a-6c88d132 ReadConsoleW 1106->1114 1107->1062 1108->1081 1116 6c88d0c4-6c88d0c6 1108->1116 1109->1105 1110->1076 1123 6c88d13a-6c88d140 call 6c86f99c 1111->1123 1124 6c88d203-6c88d205 1111->1124 1112->1105 1120 6c88d185-6c88d197 1113->1120 1121 6c88d153-6c88d15c 1114->1121 1122 6c88d134 GetLastError 1114->1122 1116->1081 1126 6c88d0c8-6c88d0df 1116->1126 1120->1107 1130 6c88d199-6c88d19d 1120->1130 1121->1120 1122->1123 1123->1105 1124->1107 1126->1081 1134 6c88d19f-6c88d1af call 6c88d2ab 1130->1134 1135 6c88d1b6-6c88d1c3 1130->1135 1147 6c88d1b2-6c88d1b4 1134->1147 1137 6c88d1cf-6c88d1d4 call 6c88d54f 1135->1137 1138 6c88d1c5 call 6c88d22d 1135->1138 1145 6c88d1ca-6c88d1cd 1137->1145 1138->1145 1145->1147 1147->1107
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9030298a2faf5e484df228a2f43ffdc1dcc058b1564cee7a4366cf487774b945
                                                    • Instruction ID: eb29c959b8fddb1cfad44c127d504e509b823a89e25ebaaa32a1c44d7b083910
                                                    • Opcode Fuzzy Hash: 9030298a2faf5e484df228a2f43ffdc1dcc058b1564cee7a4366cf487774b945
                                                    • Instruction Fuzzy Hash: 60B12774A0624AAFDB21CF9DCA41BADBBB1BF46318F10496BE5109BF81C771D842CB50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1235 6c6de4d8-6c6de507 1236 6c6de50b-6c6de514 1235->1236 1237 6c6de568-6c6de56d 1236->1237 1238 6c6de516-6c6de51b 1236->1238 1241 6c6de62e-6c6de633 1237->1241 1242 6c6de573-6c6de578 1237->1242 1239 6c6de521-6c6de526 1238->1239 1240 6c6de5c3-6c6de5c8 1238->1240 1245 6c6de52c-6c6de531 1239->1245 1246 6c6de67e-6c6de683 1239->1246 1243 6c6de5ce-6c6de5d3 1240->1243 1244 6c6de718-6c6de71d 1240->1244 1247 6c6de639-6c6de63e 1241->1247 1248 6c6de762-6c6de767 1241->1248 1249 6c6de57e-6c6de583 1242->1249 1250 6c6de6ca-6c6de6cf 1242->1250 1251 6c6de5d9-6c6de5de 1243->1251 1252 6c6de801-6c6de806 1243->1252 1257 6c6de8d0-6c6de8d5 1244->1257 1258 6c6de723-6c6de728 1244->1258 1255 6c6de79f-6c6de7a4 1245->1255 1256 6c6de537-6c6de53c 1245->1256 1265 6c6de689-6c6de68e 1246->1265 1266 6c6de878-6c6de87d 1246->1266 1259 6c6de83e-6c6de843 1247->1259 1260 6c6de644-6c6de649 1247->1260 1261 6c6de76d-6c6de772 1248->1261 1262 6c6de8f9-6c6de8fe 1248->1262 1263 6c6de589-6c6de58e 1249->1263 1264 6c6de7d4-6c6de7d9 1249->1264 1253 6c6de89d-6c6de8a2 1250->1253 1254 6c6de6d5-6c6de6da 1250->1254 1269 6c6dea7c-6c6dea98 1251->1269 1270 6c6de5e4-6c6de5e9 1251->1270 1271 6c6de80c-6c6de811 1252->1271 1272 6c6debe8-6c6debfc 1252->1272 1279 6c6de8a8-6c6de8ad 1253->1279 1280 6c6dec76-6c6dec94 1253->1280 1285 6c6deb3e-6c6deb4d 1254->1285 1286 6c6de6e0-6c6de6e5 1254->1286 1297 6c6de7aa-6c6de7af 1255->1297 1298 6c6deb67-6c6deb78 call 6c87f71f 1255->1298 1289 6c6de9d9-6c6de9f9 1256->1289 1290 6c6de542-6c6de547 1256->1290 1283 6c6de8db-6c6de8e0 1257->1283 1284 6c6de993-6c6de9be 1257->1284 1291 6c6de72e-6c6de733 1258->1291 1292 6c6de950-6c6de96e call 6c6e06c6 1258->1292 1273 6c6de849-6c6de84e 1259->1273 1274 6c6dec01-6c6dec55 call 6c86e3c0 1259->1274 1275 6c6de64f-6c6de654 1260->1275 1276 6c6dead7-6c6deaed 1260->1276 1293 6c6de778-6c6de77d 1261->1293 1294 6c6de973-6c6de98e 1261->1294 1287 6c6de904-6c6de909 1262->1287 1288 6c6de9c3-6c6de9d4 1262->1288 1295 6c6de594-6c6de599 1263->1295 1296 6c6dea21-6c6dea58 1263->1296 1267 6c6de7df-6c6de7e4 1264->1267 1268 6c6deba3-6c6debe3 1264->1268 1281 6c6deb08-6c6deb1a 1265->1281 1282 6c6de694-6c6de699 1265->1282 1277 6c6dec5a-6c6dec71 1266->1277 1278 6c6de883-6c6de888 1266->1278 1267->1236 1314 6c6de7ea-6c6de7fc 1267->1314 1268->1236 1269->1236 1299 6c6dea9d-6c6dead2 call 6c87f71f 1270->1299 1300 6c6de5ef-6c6de5f4 1270->1300 1271->1236 1315 6c6de817-6c6de839 1271->1315 1272->1236 1273->1236 1316 6c6de854-6c6de873 1273->1316 1274->1236 1302 6c6deaef-6c6deb03 1275->1302 1303 6c6de65a-6c6de65f 1275->1303 1301 6c6deb31-6c6deb39 1276->1301 1277->1236 1278->1236 1317 6c6de88e-6c6de898 1278->1317 1279->1236 1318 6c6de8b3-6c6de8bd 1279->1318 1280->1236 1281->1236 1306 6c6deb1f-6c6deb2d 1282->1306 1307 6c6de69f-6c6de6a4 1282->1307 1283->1236 1319 6c6de8e6-6c6de8f4 1283->1319 1284->1236 1304 6c6deb50-6c6deb62 1285->1304 1309 6c6dec99-6c6dec9e 1286->1309 1310 6c6de6eb-6c6de713 1286->1310 1287->1236 1320 6c6de90f-6c6de94b 1287->1320 1288->1236 1289->1236 1321 6c6de54d-6c6de552 1290->1321 1322 6c6de9fe-6c6dea1c 1290->1322 1291->1236 1311 6c6de739-6c6de75d 1291->1311 1292->1236 1293->1236 1312 6c6de783-6c6de79a 1293->1312 1294->1236 1324 6c6dea5d-6c6dea77 1295->1324 1325 6c6de59f-6c6de5a4 1295->1325 1296->1236 1297->1236 1313 6c6de7b5-6c6de7cf 1297->1313 1329 6c6deb7d-6c6deb9e 1298->1329 1299->1236 1300->1236 1327 6c6de5fa-6c6de629 1300->1327 1301->1236 1302->1236 1303->1236 1328 6c6de665-6c6de679 1303->1328 1304->1236 1306->1301 1307->1236 1330 6c6de6aa-6c6de6c5 1307->1330 1309->1236 1332 6c6deca4-6c6decb3 1309->1332 1310->1236 1311->1236 1312->1236 1313->1236 1314->1301 1333 6c6de8c5-6c6de8cb 1315->1333 1316->1236 1317->1236 1334 6c6de8c2 1318->1334 1319->1236 1320->1236 1321->1236 1335 6c6de554-6c6de563 1321->1335 1322->1304 1324->1236 1325->1236 1337 6c6de5aa-6c6de5be 1325->1337 1327->1236 1328->1236 1329->1236 1330->1236 1333->1236 1334->1333 1335->1334 1337->1236
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock
                                                    • String ID: tJe$uJe
                                                    • API String ID: 2638373210-462319029
                                                    • Opcode ID: c4af98d67da0a3c8fd554ba3fb9f8cdcfea8f2bc5c8ebc8302512543f3d9c1ec
                                                    • Instruction ID: c6b651b1027cf6fc0d1290bc4fe0cd66633b487cdb38ab73fea7680ff239c759
                                                    • Opcode Fuzzy Hash: c4af98d67da0a3c8fd554ba3fb9f8cdcfea8f2bc5c8ebc8302512543f3d9c1ec
                                                    • Instruction Fuzzy Hash: 91120274619741DFCB64CF19C180A5AFBE0AB8A348F114D6EF899CB760E631E844CB96

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1339 6c78dd01-6c78dd14 GetModuleHandleW 1340 6c78dd3b-6c78dd3d 1339->1340 1341 6c78dd16-6c78dd27 GetProcAddress 1339->1341 1342 6c78dd29-6c78dd38 1341->1342 1343 6c78dd3a 1341->1343 1342->1343 1343->1340
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(Shell32,?,?,6C6FC052,MFCApplication4.AppID.NoVersion), ref: 6C78DD0C
                                                    • GetProcAddress.KERNEL32(00000000,SetCurrentProcessExplicitAppUserModelID), ref: 6C78DD1D
                                                    Strings
                                                    • SetCurrentProcessExplicitAppUserModelID, xrefs: 6C78DD17
                                                    • Shell32, xrefs: 6C78DD05
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: SetCurrentProcessExplicitAppUserModelID$Shell32
                                                    • API String ID: 1646373207-2658420654
                                                    • Opcode ID: 95ee0243c816bc4cc5000e394cdb2d51ea9f41d90b27d252a6b16931c4ea4b26
                                                    • Instruction ID: 76fdb5a0c5796e70f23d9da29d03e0d98e803808a522339defb0742f0cb6e26a
                                                    • Opcode Fuzzy Hash: 95ee0243c816bc4cc5000e394cdb2d51ea9f41d90b27d252a6b16931c4ea4b26
                                                    • Instruction Fuzzy Hash: 49E04F72B027156B8639AB66DD1DC5B7B68DB966A5310083BFA05C2700DE74E801C6F4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1467 6c6fb7d7-6c6fb91b call 6c6f9168 1471 6c6fb91d-6c6fb929 1467->1471 1472 6c6fb953-6c6fb966 call 6c6fbd9e 1467->1472 1474 6c6fb92b-6c6fb936 1471->1474 1475 6c6fb949-6c6fb950 call 6c70116e 1471->1475 1481 6c6fbafe-6c6fbb05 1472->1481 1482 6c6fb96c-6c6fb995 call 6c6f9828 call 6c6fb195 1472->1482 1477 6c6fb93c-6c6fb947 1474->1477 1478 6c6fbcdb-6c6fbce7 call 6c87c237 call 6c6d9714 1474->1478 1475->1472 1477->1475 1497 6c6fbcec-6c6fbd0b call 6c6d9714 call 6c6dc08c 1478->1497 1484 6c6fbb07-6c6fbb27 call 6c6fa6cf 1481->1484 1485 6c6fbb40-6c6fbb54 CreateThread 1481->1485 1506 6c6fb9bf-6c6fb9d4 1482->1506 1507 6c6fb997-6c6fb99d 1482->1507 1498 6c6fbb2e-6c6fbb3a CreateThread 1484->1498 1499 6c6fbb29 1484->1499 1490 6c6fbb5a-6c6fbb6d WaitForSingleObject 1485->1490 1491 6c6fbc35-6c6fbcd6 call 6c6fb3ef call 6c6fb0de call 6c6f83fc call 6c6fb654 call 6c6dc08c call 6c6da138 call 6c6f9953 CreateThread call 6c6f86c6 call 6c879c1f 1485->1491 1490->1491 1496 6c6fbb73-6c6fbb80 CloseHandle 1490->1496 1491->1478 1502 6c6fbbbc-6c6fbbd4 1496->1502 1503 6c6fbb82-6c6fbb98 1496->1503 1498->1485 1499->1498 1508 6c6fbb9a-6c6fbba5 1503->1508 1509 6c6fbbb2-6c6fbbb9 call 6c70116e 1503->1509 1512 6c6fb9d9-6c6fb9e9 1506->1512 1513 6c6fb9d6 1506->1513 1507->1497 1515 6c6fb9a3-6c6fb9b4 1507->1515 1508->1478 1516 6c6fbbab-6c6fbbb0 1508->1516 1509->1502 1519 6c6fbaa2-6c6fbac4 call 6c88067e 1512->1519 1513->1512 1521 6c6fb9ee-6c6fba01 1515->1521 1522 6c6fb9b6-6c6fb9bd 1515->1522 1516->1509 1530 6c6fbac9-6c6fbacf 1519->1530 1524 6c6fba07-6c6fba17 call 6c6d971e 1521->1524 1525 6c6fbbd5-6c6fbbe4 1521->1525 1522->1524 1544 6c6fba1a-6c6fba22 1524->1544 1528 6c6fbc0f-6c6fbc17 1525->1528 1529 6c6fbbe6-6c6fbbeb 1525->1529 1528->1524 1533 6c6fbc1d-6c6fbc30 call 6c701139 1528->1533 1534 6c6fba25-6c6fba31 1529->1534 1530->1481 1535 6c6fbad1-6c6fbada 1530->1535 1533->1544 1538 6c6fba83-6c6fba98 call 6c86e3c0 1534->1538 1539 6c6fba33-6c6fba5b call 6c86e3c0 1534->1539 1541 6c6fbadc-6c6fbae7 1535->1541 1542 6c6fbaf4-6c6fbafb call 6c70116e 1535->1542 1558 6c6fba9f 1538->1558 1556 6c6fba5d-6c6fba6a 1539->1556 1557 6c6fba77-6c6fba81 call 6c70116e 1539->1557 1541->1478 1549 6c6fbaed-6c6fbaf2 1541->1549 1542->1481 1544->1534 1549->1542 1556->1478 1560 6c6fba70-6c6fba75 1556->1560 1557->1558 1558->1519 1560->1557
                                                    APIs
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_0002A446,6C911034,00000000,00000000), ref: 6C6FBB3A
                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00029B35,00000000,00000000,00000000), ref: 6C6FBB4C
                                                    • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C6FBB62
                                                    • CloseHandle.KERNELBASE(00000000), ref: 6C6FBB74
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CreateThread$CloseHandleObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 15858426-0
                                                    • Opcode ID: edda7891c3d80f32f5f84c7845ccb10557968e0121986d3bec990b4d779e2487
                                                    • Instruction ID: ddc75b506f9831f696e0ffad93a646fa92f47341609694a3833decd31a1a8d95
                                                    • Opcode Fuzzy Hash: edda7891c3d80f32f5f84c7845ccb10557968e0121986d3bec990b4d779e2487
                                                    • Instruction Fuzzy Hash: 2B710971D011049FDB24CF64C884AEEB3B7EF85318F154628E825B7780EB74AD86C795

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1567 6c6fa446-6c6fa48e call 6c880c70 1570 6c6fa596-6c6fa59d call 6c6d9714 1567->1570 1571 6c6fa494-6c6fa496 1567->1571 1576 6c6fa5a2-6c6fa5c1 call 6c880c70 1570->1576 1572 6c6fa499-6c6fa49c 1571->1572 1574 6c6fa49e-6c6fa4c2 call 6c86e3c0 1572->1574 1575 6c6fa4c4-6c6fa4cc 1572->1575 1586 6c6fa513-6c6fa52e call 6c6f9b7b 1574->1586 1578 6c6fa4ce 1575->1578 1579 6c6fa4d3-6c6fa4e3 1575->1579 1576->1570 1585 6c6fa5c3-6c6fa5c8 1576->1585 1578->1579 1583 6c6fa4ed-6c6fa4ee call 6c701139 1579->1583 1584 6c6fa4e5-6c6fa4eb call 6c6d971e 1579->1584 1593 6c6fa4f3-6c6fa510 call 6c86e3c0 1583->1593 1584->1593 1590 6c6fa5ca-6c6fa5e6 call 6c86e3c0 1585->1590 1591 6c6fa5e8-6c6fa601 1585->1591 1599 6c6fa560-6c6fa562 1586->1599 1600 6c6fa530-6c6fa53c 1586->1600 1607 6c6fa63f-6c6fa658 call 6c6f9d68 1590->1607 1596 6c6fa603-6c6fa610 call 6c6d971e 1591->1596 1597 6c6fa612-6c6fa61a call 6c701139 1591->1597 1593->1586 1610 6c6fa61f-6c6fa63c call 6c86e3c0 1596->1610 1597->1610 1599->1576 1609 6c6fa564-6c6fa581 Sleep call 6c880c70 1599->1609 1605 6c6fa53e-6c6fa549 1600->1605 1606 6c6fa556-6c6fa55d call 6c70116e 1600->1606 1611 6c6fa54f-6c6fa554 1605->1611 1612 6c6fa6a2-6c6fa6ba call 6c87c237 call 6c6dc08c 1605->1612 1606->1599 1622 6c6fa68d-6c6fa69f 1607->1622 1623 6c6fa65a-6c6fa666 1607->1623 1620 6c6fa586-6c6fa590 1609->1620 1610->1607 1611->1606 1620->1570 1620->1572 1625 6c6fa668-6c6fa673 1623->1625 1626 6c6fa683-6c6fa68a call 6c70116e 1623->1626 1625->1612 1628 6c6fa675-6c6fa681 1625->1628 1626->1622 1628->1626
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: _strlen$Sleep
                                                    • String ID:
                                                    • API String ID: 2737124692-0
                                                    • Opcode ID: 2d492d9a9ab1b93645bdd1f8602a95bfd8690b75722d2ba7720d90a7cac5f78c
                                                    • Instruction ID: 67de19b04a28ccbaa861a5185fbcf5dd03f87658941caef75f1b60f05a96f458
                                                    • Opcode Fuzzy Hash: 2d492d9a9ab1b93645bdd1f8602a95bfd8690b75722d2ba7720d90a7cac5f78c
                                                    • Instruction Fuzzy Hash: 827145B2D012189BCB10CF78DD847DE7BB7AF09318F150735E829A7B81E7359A488795

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1632 6c6e17e6-6c6e184c call 6c7bef60 1635 6c6e184e-6c6e1857 call 6c7bf1f5 1632->1635 1636 6c6e1875-6c6e189b call 6c7bf65f 1632->1636 1639 6c6e185c-6c6e1872 1635->1639 1641 6c6e189d-6c6e18a3 call 6c87f915 1636->1641 1642 6c6e18a6-6c6e18b4 1636->1642 1641->1642 1643 6c6e18bf-6c6e18cd 1642->1643 1644 6c6e18b6-6c6e18bc call 6c87f915 1642->1644 1647 6c6e18cf-6c6e18d5 call 6c87f915 1643->1647 1648 6c6e18d8-6c6e18e6 1643->1648 1644->1643 1647->1648 1652 6c6e18e8-6c6e18ee call 6c87f915 1648->1652 1653 6c6e18f1-6c6e18ff 1648->1653 1652->1653 1656 6c6e190a-6c6e1918 1653->1656 1657 6c6e1901-6c6e1907 call 6c87f915 1653->1657 1658 6c6e191a-6c6e1920 call 6c87f915 1656->1658 1659 6c6e1923-6c6e1935 call 6c7bef91 1656->1659 1657->1656 1658->1659
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 6C6E181C
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E192C
                                                      • Part of subcall function 6C7BF1F5: _Yarn.LIBCPMT ref: 6C7BF215
                                                      • Part of subcall function 6C7BF1F5: _Yarn.LIBCPMT ref: 6C7BF239
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                    • String ID: bad locale name
                                                    • API String ID: 2070049627-1405518554
                                                    • Opcode ID: 2fac02b358a52263a1da8f6cec9fef43a7c63be2c4de5ce87b1339587f348b40
                                                    • Instruction ID: 0f8c57b8a40e8180ee5bd1aa6b899325c19a1c57994c964995196403381161f6
                                                    • Opcode Fuzzy Hash: 2fac02b358a52263a1da8f6cec9fef43a7c63be2c4de5ce87b1339587f348b40
                                                    • Instruction Fuzzy Hash: 12416CF1A01745ABDB20CF6AD944B8BBBE8BF18644F04463AE409D7B41E734E518CBE5
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 6C6E9115
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::_Lockit.LIBCPMT ref: 6C6E142F
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E144A
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E9187
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID: 8|W
                                                    • API String ID: 593203224-2747047831
                                                    • Opcode ID: 257882867a7f7ca9adf087f8cde2fc6fd077e5e3ad71cb66ee13fb214516dbed
                                                    • Instruction ID: e2a43afad5d161c409cb17b9d4cd3af96a44aa731febe0a3f838eddd5675b39b
                                                    • Opcode Fuzzy Hash: 257882867a7f7ca9adf087f8cde2fc6fd077e5e3ad71cb66ee13fb214516dbed
                                                    • Instruction Fuzzy Hash: 3C2180B5D002099FCB10DFA8C945ADDB7F4FF4D718F100529E809A7B80E735A954CBA5
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 6C6E9115
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::_Lockit.LIBCPMT ref: 6C6E142F
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E144A
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E9187
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID: 8|W
                                                    • API String ID: 593203224-2747047831
                                                    • Opcode ID: 91cba8cd27694678da3c474c1828681709c89441ee4bb4b9340873fbcc2fc276
                                                    • Instruction ID: bda22fd48bb1b0f51ce66c59ac4800cdb69c860feab0f507ea600e61ecd54df8
                                                    • Opcode Fuzzy Hash: 91cba8cd27694678da3c474c1828681709c89441ee4bb4b9340873fbcc2fc276
                                                    • Instruction Fuzzy Hash: 85218EB5E002099FCB10DFA8C945ADEBBF4FF49718F100629E845E7B40E731A908CBA5
                                                    APIs
                                                    • DeleteFileW.KERNELBASE(6C8806D1,?,6C8806D1,?,?,?,?), ref: 6C88D711
                                                    • GetLastError.KERNEL32(?,6C8806D1,?,?,?,?), ref: 6C88D71B
                                                    • __dosmaperr.LIBCMT ref: 6C88D722
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DeleteErrorFileLast__dosmaperr
                                                    • String ID:
                                                    • API String ID: 1545401867-0
                                                    • Opcode ID: 54513db739ebf5d91cd0245e1769487a9ce1a182c5ea415094722eb870b4b19c
                                                    • Instruction ID: 34a41dd3964bb56d79cfe70538343eafe7e80db138c475a1792ea54c5cf4b995
                                                    • Opcode Fuzzy Hash: 54513db739ebf5d91cd0245e1769487a9ce1a182c5ea415094722eb870b4b19c
                                                    • Instruction Fuzzy Hash: D2D0C932606249678E202ABABD0C9073BBC9B822B93150A32F42EC59A0DA69D451D5A1
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C757325
                                                      • Part of subcall function 6C703FFF: __EH_prolog3_GS.LIBCMT ref: 6C704009
                                                      • Part of subcall function 6C703FFF: GetCurrentThread.KERNEL32 ref: 6C704068
                                                      • Part of subcall function 6C703FFF: GetCurrentThreadId.KERNEL32 ref: 6C704071
                                                      • Part of subcall function 6C703FFF: GetVersionExW.KERNEL32 ref: 6C70410D
                                                      • Part of subcall function 6C757608: __EH_prolog3.LIBCMT ref: 6C75760F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CurrentH_prolog3Thread$H_prolog3_Version
                                                    • String ID: Workspace
                                                    • API String ID: 3621167777-258310842
                                                    • Opcode ID: 530c83c20fd040723b86af063c98b43376c62b7b2008427ef6cb5ed9ad9b9153
                                                    • Instruction ID: 8828dbf234793c4c7375a38aba17d20f490ff1a13bf2be2314adc76b5bfb0728
                                                    • Opcode Fuzzy Hash: 530c83c20fd040723b86af063c98b43376c62b7b2008427ef6cb5ed9ad9b9153
                                                    • Instruction Fuzzy Hash: A92104B0B00A53AFC758CF78C544BD9FAA0BF48314F50862A903DA7780DB706628CB91
                                                    APIs
                                                    • Sleep.KERNELBASE(00000064), ref: 6C6F8314
                                                    Strings
                                                    • Game Over! Final Score: , xrefs: 6C6F831C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID: Game Over! Final Score:
                                                    • API String ID: 3472027048-1191702134
                                                    • Opcode ID: 0f662a5d1bb3b285fc3177ddbb8493e9caba3a7ec80fdb923eafd161195575ad
                                                    • Instruction ID: 683b8f7960d6cd35a4efec507f88e9d4a7d14b8af09dc2520bcf48b3a5e19636
                                                    • Opcode Fuzzy Hash: 0f662a5d1bb3b285fc3177ddbb8493e9caba3a7ec80fdb923eafd161195575ad
                                                    • Instruction Fuzzy Hash: 80214CF2D001045FDB04DBB5AC419ED7B659F56218F044576D826E3B60FB31D90E8699
                                                    APIs
                                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6C6E196D
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E1A04
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: std::_$Locinfo::_Locinfo_dtorLockitLockit::~_
                                                    • String ID:
                                                    • API String ID: 3286764726-0
                                                    • Opcode ID: a30947fe63484ceed2a046b5bf868aa1a1fe14d9dd0e58c6efde5bde18832fc3
                                                    • Instruction ID: 67671ea1c8e5779927b64c6b6d44ac6429509e4275fbdb94aeb6719c7ff3814d
                                                    • Opcode Fuzzy Hash: a30947fe63484ceed2a046b5bf868aa1a1fe14d9dd0e58c6efde5bde18832fc3
                                                    • Instruction Fuzzy Hash: 2C2162F1A017019FEB20DF69D909B4BB7E8AB04744F008939E45997B41E739F508CBA1
                                                    APIs
                                                    • SetFilePointerEx.KERNELBASE(00000000,00000000,?,00008000,6C6E23F3,00008000,6C88A23C,?,?,?,6C889FF7,6C88A23C,00000000,00000000,6C6E23F3,?), ref: 6C88A1AB
                                                    • GetLastError.KERNEL32(00000000,?,?,?,6C889FF7,6C88A23C,00000000,00000000,6C6E23F3,?,00000000,00008000,6C88A23C,?,?,6C89315B), ref: 6C88A1B8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastPointer
                                                    • String ID:
                                                    • API String ID: 2976181284-0
                                                    • Opcode ID: 8ee470d583a326daa712c330af3542f19c20901a7cf08a0200fbeeaa99d5db71
                                                    • Instruction ID: aaa004cd69b4f1d42a390b8fce66d8eea04fdd9c14bd460df9846d9d6ab7e37d
                                                    • Opcode Fuzzy Hash: 8ee470d583a326daa712c330af3542f19c20901a7cf08a0200fbeeaa99d5db71
                                                    • Instruction Fuzzy Hash: 20014436604259AFCB158F19CC05DCE3F6ADF81368B280618F8129BAC0E631E941CB90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Yarn
                                                    • String ID:
                                                    • API String ID: 1767336200-0
                                                    • Opcode ID: 4d2bdd264389a4af741bc00c1e313d0c59c94c53c34b070c8741926cda3ea943
                                                    • Instruction ID: 2d6fe20b261a0fe85f4131e93444d3020dae15f8500aff0e971727f5b555eb99
                                                    • Opcode Fuzzy Hash: 4d2bdd264389a4af741bc00c1e313d0c59c94c53c34b070c8741926cda3ea943
                                                    • Instruction Fuzzy Hash: CFE0E52E304600ABEB1C5A65AE11BFA33D8DB46AA4F10443DEC0EDAEC0EF20EC088510
                                                    APIs
                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,6C87F92D,6C7BF630,6C6D9720,?,6C86CC73,00000000,6C6D971E,?,?,?,6C7BF5D0,6C7BF630,6C6D9722), ref: 6C8837ED
                                                    • GetLastError.KERNEL32(00000000,?,6C87F92D,6C7BF630,6C6D9720,?,6C86CC73,00000000,6C6D971E,?,?,?,6C7BF5D0,6C7BF630,6C6D9722,6C6D971E), ref: 6C8837F8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 485612231-0
                                                    • Opcode ID: c5cbbef8f68bc3f4105e02ceb0d7bc899566fc1e6b11abd78bf77d84be514ed7
                                                    • Instruction ID: 2c2e30cbd05e28fd10425ab782f0201c6e08e25d3b2649539b28e5c05f10d63a
                                                    • Opcode Fuzzy Hash: c5cbbef8f68bc3f4105e02ceb0d7bc899566fc1e6b11abd78bf77d84be514ed7
                                                    • Instruction Fuzzy Hash: 43E08C32206224ABCF212BA6A909B893A79EB017DDF618430F60986E60DB34D850C794
                                                    APIs
                                                    • CloseHandle.KERNELBASE(00000000,?,00000000,?,6C88BACF,6C893331,?,00000000,00000000), ref: 6C88BB36
                                                    • GetLastError.KERNEL32(?,00000000,?,6C88BACF,6C893331,?,00000000,00000000), ref: 6C88BB40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseErrorHandleLast
                                                    • String ID:
                                                    • API String ID: 918212764-0
                                                    • Opcode ID: 9092932ce161daa2e2a396bf4b8e69dd671e16294261e00c16b1931c942f4a82
                                                    • Instruction ID: ad70f8d356cca8e185742ef58cb18884ad67dafb2a88bb8df3c15dff8e704bac
                                                    • Opcode Fuzzy Hash: 9092932ce161daa2e2a396bf4b8e69dd671e16294261e00c16b1931c942f4a82
                                                    • Instruction Fuzzy Hash: 49112C3260B11467CA35553D9E45FBD376A8FC2B7CF250A39E92986EC1EB75C444C1A0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ff7e1daf5929c39b70c9e094199817ab9159c66e67914e1328e180a6d27cd882
                                                    • Instruction ID: a6600aa3010e99d3a5b0770fc4da043880c2030951b28a472be0646066e7e31f
                                                    • Opcode Fuzzy Hash: ff7e1daf5929c39b70c9e094199817ab9159c66e67914e1328e180a6d27cd882
                                                    • Instruction Fuzzy Hash: 1051E571A05248AFDB30CF5DC981E9DBBB1EF56328F248558F8085B751E732D941CBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3
                                                    • String ID:
                                                    • API String ID: 431132790-0
                                                    • Opcode ID: 8aae861d291314451eefce6ce4ee1b7e60077e3edb005733f1923c148a2db1d7
                                                    • Instruction ID: ea71a3061abaf60b4d1d538759b49d92d869e3da2be3817699b3f25ab59a4a25
                                                    • Opcode Fuzzy Hash: 8aae861d291314451eefce6ce4ee1b7e60077e3edb005733f1923c148a2db1d7
                                                    • Instruction Fuzzy Hash: 3F51DEB0906F458FD3A9CF7A85457C6FAE0BF89300F50CA2E81AED6660EB7161848F51
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: __wsopen_s
                                                    • String ID:
                                                    • API String ID: 3347428461-0
                                                    • Opcode ID: 52696f25d8df2d7a3e68bb86ce2177dbe42669244f7409c63badcf621bc0eda4
                                                    • Instruction ID: b99d3d7a75dd149e4c908194ac1c44c07b3cedf057474a5da51b6b8ff8f6129b
                                                    • Opcode Fuzzy Hash: 52696f25d8df2d7a3e68bb86ce2177dbe42669244f7409c63badcf621bc0eda4
                                                    • Instruction Fuzzy Hash: 22118C71A0420AAFCF15CF58E9419DB3BF9EF48308F104469F809AB351D771EA15CBA4
                                                    APIs
                                                      • Part of subcall function 6C86C646: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C6D971E,?,?,?,6C7BF63E,6C6D971E,6C901A88,?,6C6D971E,string too long,6C6FA5A2), ref: 6C86C6A7
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 6C6E181C
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E192C
                                                      • Part of subcall function 6C7BF1F5: _Yarn.LIBCPMT ref: 6C7BF215
                                                      • Part of subcall function 6C7BF1F5: _Yarn.LIBCPMT ref: 6C7BF239
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: LockitYarnstd::_$ExceptionLockit::_Lockit::~_Raise
                                                    • String ID:
                                                    • API String ID: 1510690549-0
                                                    • Opcode ID: c8767a1d305ac944a5fc655aa3f58557cfb22e08d5f0b6a22f6189f77dc8dfbe
                                                    • Instruction ID: e075bee5d668ab35703dc8cbeb28d7549e89189e057ebe26b8047eec507c3435
                                                    • Opcode Fuzzy Hash: c8767a1d305ac944a5fc655aa3f58557cfb22e08d5f0b6a22f6189f77dc8dfbe
                                                    • Instruction Fuzzy Hash: 24116AB1901B86AFC710DF6AC985A86FFB4FF59710F44866ED4089BB11C334A424CBE9
                                                    APIs
                                                    • SHGetMalloc.SHELL32(00000004), ref: 6C80173C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Malloc
                                                    • String ID:
                                                    • API String ID: 2696272793-0
                                                    • Opcode ID: 8a9e4cf8351ac4d971b70c30dae7961b1e1aaad7bc5e46494b1216bcfccc01d3
                                                    • Instruction ID: dedd5715baa3a26b3d5393fd6b0fde17d9df2eeffdf107fdc19f9e91610f8e02
                                                    • Opcode Fuzzy Hash: 8a9e4cf8351ac4d971b70c30dae7961b1e1aaad7bc5e46494b1216bcfccc01d3
                                                    • Instruction Fuzzy Hash: EB11C0B67182049FCB20CF15D90AB96B7F8FB49729F10492EE416C7A40D734E804CBC0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7C1712
                                                      • Part of subcall function 6C7C134E: TlsAlloc.KERNEL32(?,6C7C173E,00000004,6C77C8C8,6C75EE4E,6C77FACA,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C136D
                                                      • Part of subcall function 6C7C134E: InitializeCriticalSection.KERNEL32(6C914114,?,6C7C173E,00000004,6C77C8C8,6C75EE4E,6C77FACA,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C137E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AllocCriticalH_prolog3InitializeSection
                                                    • String ID:
                                                    • API String ID: 2369468792-0
                                                    • Opcode ID: 6513a44ff44d56a9d08c8d3588da51d31579647a19943f0fd22f270706b4cf70
                                                    • Instruction ID: dce785caad358c057ea8dea277c2af42fd5c59fed4bdf3d7019c7e98e2962016
                                                    • Opcode Fuzzy Hash: 6513a44ff44d56a9d08c8d3588da51d31579647a19943f0fd22f270706b4cf70
                                                    • Instruction Fuzzy Hash: 57014C347042078FEB149BB5CA1EA9976B5AB163ACB204134E961DBF80EB34C914CB82
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000000,6C7BF630,6C6D971E,?,6C86CC4D,6C6D9720,6C6D971E,?,?,?,6C7BF5D0,6C7BF630,6C6D9722,6C6D971E,6C6D971E,6C6D971E), ref: 6C883843
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: f19ee9e789e28e724634f59a98958babb804bb20be681ef1dc51704a772eff46
                                                    • Instruction ID: de1bcc3cc68d203b7a89ed364109e043e80b62cc67525e0a35c93f899428ebb5
                                                    • Opcode Fuzzy Hash: f19ee9e789e28e724634f59a98958babb804bb20be681ef1dc51704a772eff46
                                                    • Instruction Fuzzy Hash: F8E0653124723567EA3116698F05B8A366C9B43FE9F910934EC5497E94EB64DC00C1E1
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,00000000,?,6C8931E7,?,?,00000000,?,6C8931E7,?,0000000C), ref: 6C893560
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: a743bb6a84876978fbce7eea427be14aad3ea574c8bb5968d7e550e358011ea4
                                                    • Instruction ID: 69e46e441959dc5ee6435ea080e0d5a912328bc597672269d38c42ec56efa3ce
                                                    • Opcode Fuzzy Hash: a743bb6a84876978fbce7eea427be14aad3ea574c8bb5968d7e550e358011ea4
                                                    • Instruction Fuzzy Hash: 89D06C3210014DFBDF129E84DC06EDA3BAAFB88755F014010BA1896020C736E871EB90
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 6C701E6B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DeleteObject
                                                    • String ID:
                                                    • API String ID: 1531683806-0
                                                    • Opcode ID: 0c56c3173451946536c77a6fbb95a0c0c59bc76235f764de9590a5dea80d7f1d
                                                    • Instruction ID: 5b59db678400ab6fd9e189ee092fbcdf8243e2e83a148f269dff014e3f84d49f
                                                    • Opcode Fuzzy Hash: 0c56c3173451946536c77a6fbb95a0c0c59bc76235f764de9590a5dea80d7f1d
                                                    • Instruction Fuzzy Hash: 80B092E0B05102AFCE049A31970C70B69A89B4178FF8488B8A00482400DBBAC405CA40
                                                    APIs
                                                    • Sleep.KERNELBASE(00011D28), ref: 6C6F9B65
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 86e8fdfd5795ed0e32880a4a504f92a9f9d8da166b9d0296b01b1056e764286a
                                                    • Instruction ID: f50d3aa2b0f9d04bc62b7d8abc85abbc9cc07657bfbeaa155160f502a601530d
                                                    • Opcode Fuzzy Hash: 86e8fdfd5795ed0e32880a4a504f92a9f9d8da166b9d0296b01b1056e764286a
                                                    • Instruction Fuzzy Hash: 0AE04F309A83048BC610AF2CA44899AB7F5AB05714F514C66E8A4DB714D238DC42DEB7
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000467,00000000,00000000), ref: 6C812061
                                                    • GetDlgItem.USER32(0000000F,00003020), ref: 6C8120B1
                                                    • GetDlgItem.USER32(0000000F,00003020), ref: 6C8120DC
                                                    • GetWindowRect.USER32(00000000,~Col), ref: 6C8120F0
                                                    • MapDialogRect.USER32(0000000F,6C8EE2E8), ref: 6C812113
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,~Col,000000F8,00000016), ref: 6C81213D
                                                    • GetDlgItem.USER32(0000000F,00000001), ref: 6C81214E
                                                    • GetWindowRect.USER32(00000000,~Col), ref: 6C812160
                                                    • SetWindowPos.USER32(?,00000000,~Col,?,00000000,00000000,00000015,~Col), ref: 6C812184
                                                    • GetWindowRect.USER32(0000000F,~Col), ref: 6C812199
                                                    • GetWindowRect.USER32(0000000F,6C8EE2E8), ref: 6C8121F7
                                                    • GetDlgItem.USER32(0000000F,00000001), ref: 6C812209
                                                    • GetWindowRect.USER32(00000000,~Col), ref: 6C812218
                                                    • GetDlgItem.USER32(0000000F,00000001), ref: 6C812241
                                                    • ShowWindow.USER32(00000000,00000000), ref: 6C812250
                                                    • EnableWindow.USER32(00000000,00000000), ref: 6C812259
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$Item$DialogEnableMessageSendShow
                                                    • String ID: ~Col
                                                    • API String ID: 966972710-2115592497
                                                    • Opcode ID: 4d9ddceaa683aa20c0e9fc7fdfaddff75ae96fe117a0db7b33da8379a2baec1e
                                                    • Instruction ID: ee42f891eac813022b988273ebe1c7c963e515a5e3dee7dcf76f4096c5a0b54f
                                                    • Opcode Fuzzy Hash: 4d9ddceaa683aa20c0e9fc7fdfaddff75ae96fe117a0db7b33da8379a2baec1e
                                                    • Instruction Fuzzy Hash: FEA18271A0460AAFDB20CB64CA88EAFB7F9FF49308F104528E555E7A50DB34A944CB61
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3_
                                                    • String ID:
                                                    • API String ID: 1857800218-0
                                                    • Opcode ID: da0ff6fdeb925af73514d86fd307441f24aa7040e29807c87b6b157af3fc0a67
                                                    • Instruction ID: 82c62274205f74c2a2497ef6ae9826c98205b241da58eb36cc23092016bbc07d
                                                    • Opcode Fuzzy Hash: da0ff6fdeb925af73514d86fd307441f24aa7040e29807c87b6b157af3fc0a67
                                                    • Instruction Fuzzy Hash: BF42BE71E00219DFCF14CFA5CE44AAEBBB6FF49304F208269E529AB650DB30A955DF50
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 6C76CD1C
                                                    • IsWindowVisible.USER32(?), ref: 6C76CD37
                                                    • GetWindowRect.USER32(?,?), ref: 6C76CD99
                                                    • IsIconic.USER32(?), ref: 6C76CDA8
                                                    • CopyRect.USER32(?,?), ref: 6C76CDD6
                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 6C76CE0D
                                                    • GetMonitorInfoW.USER32(00000000), ref: 6C76CE14
                                                    • CopyRect.USER32(?,?), ref: 6C76CE26
                                                    • CopyRect.USER32(?,?), ref: 6C76CE34
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C76CE6A
                                                    • OffsetRect.USER32(?,?,?), ref: 6C76CE99
                                                    • GetSystemMetrics.USER32(00000022), ref: 6C76CF20
                                                    • GetSystemMetrics.USER32(00000023), ref: 6C76CF2B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$CopySystemWindow$InfoMetricsMonitorVisible$FromIconicOffsetParametersPoint
                                                    • String ID: ($,
                                                    • API String ID: 388708526-170869519
                                                    • Opcode ID: da798dcfc754e6a71f1d2b51325b3e2ec313267a8adfca46948f168deb4e57dd
                                                    • Instruction ID: 59aa75e7b7ef18b940851f92fb00b0e5c81b79db2fc19a51fbe2b5af005458de
                                                    • Opcode Fuzzy Hash: da798dcfc754e6a71f1d2b51325b3e2ec313267a8adfca46948f168deb4e57dd
                                                    • Instruction Fuzzy Hash: 4C716A71E0121A9FDF14DFB5CA49BEEBBB9BF08309F104169E915E7A40DB30A944CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $IP=$Port=$uHj@h
                                                    • API String ID: 0-2264185922
                                                    • Opcode ID: ae123ec4aa1b6dcda407dd4572c1dc4539ab409e0db9227cf679d009951fff60
                                                    • Instruction ID: 11f559e62b541ff613cc7d911e8d1419756ee1d543b549d1456c1a7553314e3e
                                                    • Opcode Fuzzy Hash: ae123ec4aa1b6dcda407dd4572c1dc4539ab409e0db9227cf679d009951fff60
                                                    • Instruction Fuzzy Hash: CC023672A047409FD720CF39CC45B9677F6FB8B308F144A29E46687AA0E730E946CB95
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C7185CD
                                                    • GetClientRect.USER32(?,?), ref: 6C718601
                                                    • GetWindowRect.USER32(?,?), ref: 6C718658
                                                    • EqualRect.USER32(?,?), ref: 6C718666
                                                    • GetWindowRect.USER32(?,?), ref: 6C718684
                                                      • Part of subcall function 6C75910B: AdjustWindowRectEx.USER32(?,00000000,00000000,00000000), ref: 6C759133
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Window$AdjustClientEqual
                                                    • String ID:
                                                    • API String ID: 2779716228-0
                                                    • Opcode ID: ae0bef471e589dc32bce021714445255269c0e4513908921e62f04cb9f71bcd8
                                                    • Instruction ID: c5619adc06249c5354d706c49dac84d1018daf721fd00a2d86b037760acd11bc
                                                    • Opcode Fuzzy Hash: ae0bef471e589dc32bce021714445255269c0e4513908921e62f04cb9f71bcd8
                                                    • Instruction Fuzzy Hash: 2DD13D71E04619AFDF01CFA5CA88EEDBBB9FF09314F144229E815AB640DB30AD55CB51
                                                    APIs
                                                    • GetFocus.USER32 ref: 6C76B44C
                                                    • IsChild.USER32(00000000,?), ref: 6C76B482
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C76B49D
                                                    • IsChild.USER32(00000000,?), ref: 6C76B4BA
                                                    • SendMessageW.USER32(?,00000100,00000000,00000000), ref: 6C76B4EC
                                                    • IsIconic.USER32(?), ref: 6C76B52E
                                                    • GetAsyncKeyState.USER32(00000011), ref: 6C76B5CC
                                                    • GetAsyncKeyState.USER32(00000012), ref: 6C76B5DF
                                                    • GetAsyncKeyState.USER32(00000010), ref: 6C76B5FB
                                                    • IsWindowVisible.USER32(?), ref: 6C76B682
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ChildMessageSend$FocusIconicVisibleWindow
                                                    • String ID: p
                                                    • API String ID: 2011949956-2181537457
                                                    • Opcode ID: 1c96e33945d7baab544f22e9413350124295a7099b1e2201745a87e79d1ed85c
                                                    • Instruction ID: 3174975e4d6a403d074d2caf743a321cbcea0356ef7ab2db67d4a2e54706426a
                                                    • Opcode Fuzzy Hash: 1c96e33945d7baab544f22e9413350124295a7099b1e2201745a87e79d1ed85c
                                                    • Instruction Fuzzy Hash: CF81D171B002059FDF108F66CA88BAA7BB5BF86358F240079FC6597E51DB30E801EB90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C80CDF0
                                                    • GetKeyboardState.USER32(?), ref: 6C80CF5D
                                                    • GetKeyboardLayout.USER32(?), ref: 6C80CF83
                                                    • MapVirtualKeyW.USER32(?,00000000), ref: 6C80CF90
                                                    • ToUnicodeEx.USER32(?,00000000,?,?,00000002,00000000,00000000), ref: 6C80CFAD
                                                    • GetAsyncKeyState.USER32(00000012), ref: 6C80CFF2
                                                    • GetAsyncKeyState.USER32(00000012), ref: 6C80D010
                                                    • GetKeyboardState.USER32(?,?,?,6C914D88), ref: 6C80D042
                                                    • GetKeyboardLayout.USER32(?), ref: 6C80D055
                                                    • MapVirtualKeyW.USER32(?,00000000), ref: 6C80D060
                                                    • ToUnicodeEx.USER32(?,00000000,?,?,00000002,00000001,00000000), ref: 6C80D07B
                                                    • CharUpperW.USER32(?,?,?,6C914D88), ref: 6C80D091
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: KeyboardState$AsyncLayoutUnicodeVirtual$CharH_prolog3Upper
                                                    • String ID:
                                                    • API String ID: 2296508915-0
                                                    • Opcode ID: f52914e21d7b93f75a58f4a15e3780b1781c7976f91a13a621d410b307721e31
                                                    • Instruction ID: b4c5c8de565ec3cbb0e761885191fe4d981ae0a48b0d6f92aa9d2de14a05f777
                                                    • Opcode Fuzzy Hash: f52914e21d7b93f75a58f4a15e3780b1781c7976f91a13a621d410b307721e31
                                                    • Instruction Fuzzy Hash: 7681A471B042099FCF24DFA4CE49BEEB7B4AF55348F100869E515E7A80DB709D48CBA2
                                                    APIs
                                                    • CopyFileA.KERNEL32 ref: 6C6DB4F3
                                                    • _strlen.LIBCMT ref: 6C6DB588
                                                      • Part of subcall function 6C6DC0EA: _strlen.LIBCMT ref: 6C6DC11C
                                                    • CreateProcessA.KERNEL32 ref: 6C6DB8BE
                                                    • _strlen.LIBCMT ref: 6C6DB8E0
                                                      • Part of subcall function 6C6DA07C: OpenProcess.KERNEL32(00000410,00000000,?), ref: 6C6DA0EA
                                                      • Part of subcall function 6C6DA07C: CloseHandle.KERNEL32(?), ref: 6C6DA107
                                                    • CloseHandle.KERNEL32(?,00000000,00000002,00000040,00000001), ref: 6C6DBBC1
                                                    • CloseHandle.KERNEL32(?), ref: 6C6DBBC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle_strlen$Process$CopyCreateFileOpen
                                                    • String ID: .pid$Failed to create backup EXE. Please check the EXE path: $tor.
                                                    • API String ID: 3611994569-798931540
                                                    • Opcode ID: 058fb317b54985828eef71cbc801b1ed36cfb173dbe3b9dcc5b87d59269a4a23
                                                    • Instruction ID: a5202bce10645e92997375fc83d5714a988e58d24b28f77a80ab7cd518a360e2
                                                    • Opcode Fuzzy Hash: 058fb317b54985828eef71cbc801b1ed36cfb173dbe3b9dcc5b87d59269a4a23
                                                    • Instruction Fuzzy Hash: 1F32BCB0500B408BD724CF38C894BA6B7E5FF8A308F154A2DD49A87B85EB71F548CB59
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C70E9AF
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000464), ref: 6C70EA4B
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?,?,?,?,00000464), ref: 6C70EAA6
                                                    • GetFileTime.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,00000464), ref: 6C70EB56
                                                    • SetFileTime.KERNEL32(?,?,?,?,?,?,?,00000464), ref: 6C70EB8D
                                                    • GetFileSecurityW.ADVAPI32(?,00000004,00000000,00000000,?,?,?,?,00000464), ref: 6C70EBA7
                                                    • GetFileSecurityW.ADVAPI32(?,00000004,00000000,?,?,?,?,?,00000464), ref: 6C70EBD0
                                                    • SetFileSecurityW.ADVAPI32(?,00000004,00000000,?,?,?,00000464), ref: 6C70EBE0
                                                      • Part of subcall function 6C7DC0FD: PathStripToRootW.SHLWAPI(00000000,?,00000104,?,00000104,?,6C7DC6EA,?,?), ref: 6C7DC131
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: File$Security$PathTime$DiskFreeFullH_prolog3_NameRootSpaceStrip
                                                    • String ID: MFC
                                                    • API String ID: 3423035918-3472178984
                                                    • Opcode ID: 155722679388ea2f24cbaeddf3a76ebb451b9236ba367173c18fa2648ab9311e
                                                    • Instruction ID: ae328189dbbfd7bd85e30229e92abc7081561ed299193ad6fc2b44224b8437ed
                                                    • Opcode Fuzzy Hash: 155722679388ea2f24cbaeddf3a76ebb451b9236ba367173c18fa2648ab9311e
                                                    • Instruction Fuzzy Hash: A56154F1A0111C9BDB259F50CD88FEE77BDAF49309F0041A5A619E6580DB30AE89CF69
                                                    APIs
                                                      • Part of subcall function 6C7C89B1: IsWindow.USER32(00000000), ref: 6C7C89D0
                                                    • IsIconic.USER32(?), ref: 6C76D4EC
                                                    • GetWindowRect.USER32(?,6C76D3EB), ref: 6C76D525
                                                    • IsIconic.USER32(?), ref: 6C76D546
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76D552
                                                    • OffsetRect.USER32(6C76D3EB,00000000,00000000), ref: 6C76D562
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76D56A
                                                    • IsIconic.USER32(?), ref: 6C76D5A0
                                                    • GetSystemMetrics.USER32(00000021), ref: 6C76D5AD
                                                    • GetSystemMetrics.USER32(00000020), ref: 6C76D5B8
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$IconicWindow$Rect$LongOffset
                                                    • String ID:
                                                    • API String ID: 812917121-0
                                                    • Opcode ID: 0d7e956965ddf7098b3da4e2639f6c7a163f34494bb387dce0c7fcb6dc01a400
                                                    • Instruction ID: 903df1c701d6775e1e3d8684896e8103478c030e301aad6c764143deda5184de
                                                    • Opcode Fuzzy Hash: 0d7e956965ddf7098b3da4e2639f6c7a163f34494bb387dce0c7fcb6dc01a400
                                                    • Instruction Fuzzy Hash: A4312DB1A002059FDF10CFA9C988FAEBBF5FF09309F144169E515EB651DB30A944CB92
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C7051A5,6C703B1C,00000003,?,00000004,6C703B1C), ref: 6C7C2B6A
                                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 6C7C2B7A
                                                    • EncodePointer.KERNEL32(00000000,?,6C7051A5,6C703B1C,00000003,?,00000004,6C703B1C), ref: 6C7C2B83
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C7051A5,6C703B1C,00000003,?,00000004,6C703B1C), ref: 6C7C2B91
                                                    • GetLocaleInfoW.KERNEL32(00000000,00000004,?,00000003,?,6C7051A5,6C703B1C,00000003,?,00000004,6C703B1C), ref: 6C7C2BC8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleInfoLocaleModuleProc
                                                    • String ID: GetLocaleInfoEx$kernel32.dll
                                                    • API String ID: 1461536855-1547310189
                                                    • Opcode ID: fb9112650c9b46ff7aebd17d28f6c3b988dbabf930b7cdb5bae0c82e40131bcc
                                                    • Instruction ID: 044b63e7329958ac18661e5eef329e2d8e468c8daab1e5edffcf809bb66783ff
                                                    • Opcode Fuzzy Hash: fb9112650c9b46ff7aebd17d28f6c3b988dbabf930b7cdb5bae0c82e40131bcc
                                                    • Instruction Fuzzy Hash: 1101FF3570521AAFCF12AF64DE0DC5A3B79EB1A3A57140421FD1596620E735C920DBA1
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 6C76D5F4
                                                    • ScreenToClient.USER32(?,?), ref: 6C76D67D
                                                    • IsIconic.USER32(?), ref: 6C76D6A3
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76D6AF
                                                    • PtInRect.USER32(00000000,?,?), ref: 6C76D700
                                                    • PtInRect.USER32(?,?,?), ref: 6C76D72A
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76D740
                                                    • PtInRect.USER32(?,?,?), ref: 6C76D75C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$MetricsSystem$ClientIconicScreenVisibleWindow
                                                    • String ID:
                                                    • API String ID: 650494277-0
                                                    • Opcode ID: 47f6be89a0339d63eb9e807a39b71d60b6ab8c2a7f40803509767e29b854b855
                                                    • Instruction ID: 62a9612193eba92eac5a4bdadc156d515c797ab13f5018912cad2f692ec78f9a
                                                    • Opcode Fuzzy Hash: 47f6be89a0339d63eb9e807a39b71d60b6ab8c2a7f40803509767e29b854b855
                                                    • Instruction Fuzzy Hash: 07513071A1020AEFDF04CFA5C948EEEBBB5BF08744F204169E815E7650DB30D914CBA5
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C7DC641
                                                    • PathIsUNCW.SHLWAPI(?,?,?), ref: 6C7DC6F1
                                                    • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C7DC715
                                                    • GetFullPathNameW.KERNEL32(FFFF7FFF,00000104,?,?,00000268,6C7DB6C0,?,?,?,?,00000104,00000000,00000004,00000000,6C735CCC), ref: 6C7DC674
                                                      • Part of subcall function 6C7DC5F5: GetLastError.KERNEL32(?,?,?,6C7DC726,?,FFFF7FFF), ref: 6C7DC601
                                                      • Part of subcall function 6C7DC0FD: PathStripToRootW.SHLWAPI(00000000,?,00000104,?,00000104,?,6C7DC6EA,?,?), ref: 6C7DC131
                                                    • CharUpperW.USER32(?), ref: 6C7DC743
                                                    • FindFirstFileW.KERNEL32(FFFF7FFF,?), ref: 6C7DC75B
                                                    • FindClose.KERNEL32(00000000), ref: 6C7DC767
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Path$Find$CharCloseErrorFileFirstFullH_prolog3_InformationLastNameRootStripUpperVolume
                                                    • String ID:
                                                    • API String ID: 2323451338-0
                                                    • Opcode ID: 2d1916b0d5a3f332a6414a9dc6dddb4fa7f2e90a5a8563bb1d5e45b55fa35335
                                                    • Instruction ID: 5f2bb3f47fc6dc872c02539c3bdb31ab29844021f20d878caa6906634f045f66
                                                    • Opcode Fuzzy Hash: 2d1916b0d5a3f332a6414a9dc6dddb4fa7f2e90a5a8563bb1d5e45b55fa35335
                                                    • Instruction Fuzzy Hash: E1419471605115AFDB14AB74CE8CEEE737CFF01359F1106A8E42992A50EB31FE45CA61
                                                    APIs
                                                    • SetRectEmpty.USER32(?), ref: 6C749DC2
                                                    • SetRectEmpty.USER32(?), ref: 6C749DCF
                                                    • InflateRect.USER32(?,00000000,?), ref: 6C749ECC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty$Inflate
                                                    • String ID:
                                                    • API String ID: 3025764292-0
                                                    • Opcode ID: 71ae68cd1cebe530419a1ce72ae86525b1cf931184abd5371fdf51dca97517fa
                                                    • Instruction ID: 29ee163177bde638a7c56c2b16bfb1251c333b407ccbef19314e9abd1ee13cc5
                                                    • Opcode Fuzzy Hash: 71ae68cd1cebe530419a1ce72ae86525b1cf931184abd5371fdf51dca97517fa
                                                    • Instruction Fuzzy Hash: CCF17C71A0160ADFDF05CF64CA04BEEB7B6FF49318F148239E815A7680DB71A855CB90
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C7FC460
                                                    • GetVersionExW.KERNEL32(?), ref: 6C7FC4DC
                                                    • CoInitializeEx.OLE32(00000000,00000002), ref: 6C7FC66C
                                                    • CoCreateInstance.OLE32(6C8BBAA8,00000000,00000001,6C8C3614,?), ref: 6C7FC6B3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CreateH_prolog3_InitializeInstanceVersion
                                                    • String ID: @
                                                    • API String ID: 1117250964-2766056989
                                                    • Opcode ID: 28be8f6d81002f7b95f6c464c024c2af3cab4c0b237b876daee71f5156ee4cc8
                                                    • Instruction ID: 8380a113b35e34b9d078e4e2af5897726f6cbacaff24a2717740d22eea8ca118
                                                    • Opcode Fuzzy Hash: 28be8f6d81002f7b95f6c464c024c2af3cab4c0b237b876daee71f5156ee4cc8
                                                    • Instruction Fuzzy Hash: 75814AB0B01616AFD764DF28CA84BD9B7F4BF09325F00426AE828D7740DB34A955CFA5
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,6C88FF8B,00000002,00000000,?,?,?,6C88FF8B,?,00000000), ref: 6C890653
                                                    • GetLocaleInfoW.KERNEL32(?,20001004,6C88FF8B,00000002,00000000,?,?,?,6C88FF8B,?,00000000), ref: 6C89067C
                                                    • GetACP.KERNEL32(?,?,6C88FF8B,?,00000000), ref: 6C890691
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID: ACP$OCP
                                                    • API String ID: 2299586839-711371036
                                                    • Opcode ID: acefb4d29dad07e2650a48952d37d9f730cf648c29122e999e7587a51147a528
                                                    • Instruction ID: 9f7a2be204bbf23c29bbbda521020fae589f551cbcfa6c38df8fa719585431b3
                                                    • Opcode Fuzzy Hash: acefb4d29dad07e2650a48952d37d9f730cf648c29122e999e7587a51147a528
                                                    • Instruction Fuzzy Hash: FA21C422744384EAD7328F5ECB04A8776B7ABC9F5CB668D24E816D7900E732DD81C790
                                                    APIs
                                                    • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6C88FF5D
                                                    • IsValidCodePage.KERNEL32(00000000), ref: 6C88FF9B
                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 6C88FFAE
                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C88FFF6
                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C890011
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Locale$InfoValid$CodeDefaultPageUser
                                                    • String ID:
                                                    • API String ID: 3475089800-0
                                                    • Opcode ID: 45739c049e708dfb3f6acb2a9fc8232edc090bd087be6b9002d5e3bee6cf22c8
                                                    • Instruction ID: e9e59a9c1bc68037a424c26e8a5443db6d1a29dfc34ca271e4ec61fb0fee3cb9
                                                    • Opcode Fuzzy Hash: 45739c049e708dfb3f6acb2a9fc8232edc090bd087be6b9002d5e3bee6cf22c8
                                                    • Instruction Fuzzy Hash: 86516671A022459BEF20DFA9CD44EAE77B8FF19748F104875E510DB980EB74E505CB61
                                                    APIs
                                                    • FindResourceW.KERNEL32(?,?,00000006,00000000,?,?,?,?,6C6D201F,00000000,?,?), ref: 6C6D4DF4
                                                    • LoadResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E08
                                                    • LockResource.KERNEL32(00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E1A
                                                    • SizeofResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E28
                                                    • SysAllocStringLen.OLEAUT32(?,?), ref: 6C720D14
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$AllocFindLoadLockSizeofString
                                                    • String ID:
                                                    • API String ID: 913082835-0
                                                    • Opcode ID: d68f288747da02f38b2703c1d516673d2ba8258ae359310cf0c8bf134c32fba3
                                                    • Instruction ID: 5e632ecb5ef64e7844f44f361e308ae270c0071ddb4ee43653821b74fb46b94a
                                                    • Opcode Fuzzy Hash: d68f288747da02f38b2703c1d516673d2ba8258ae359310cf0c8bf134c32fba3
                                                    • Instruction Fuzzy Hash: 2821F6316012256BE7204F259C88A3B37ACEF46759B168029FC60DB280E7B5EC06C7A5
                                                    APIs
                                                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C6D8545
                                                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C6D85BD
                                                      • Part of subcall function 6C6D864E: ___std_exception_copy.LIBVCRUNTIME ref: 6C6D8675
                                                      • Part of subcall function 6C86C646: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C6D971E,?,?,?,6C7BF63E,6C6D971E,6C901A88,?,6C6D971E,string too long,6C6FA5A2), ref: 6C86C6A7
                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 6C6D8612
                                                    Strings
                                                    • Failed to calculate base64 decoded size., xrefs: 6C6D85DF
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: BinaryCryptString___std_exception_copy$ExceptionRaise
                                                    • String ID: Failed to calculate base64 decoded size.
                                                    • API String ID: 1999913932-3365390155
                                                    • Opcode ID: bbab3e71176252a606447330d1fcdfa055d46d46aeaa135ccee8e209c20f501a
                                                    • Instruction ID: 43e94928b623999745bf9f62e646219841541d24ee9956e56aae2074835926e1
                                                    • Opcode Fuzzy Hash: bbab3e71176252a606447330d1fcdfa055d46d46aeaa135ccee8e209c20f501a
                                                    • Instruction Fuzzy Hash: 3041B8B19012049FDB10DF58CD84ADABBB8FF49358F058929E459ABB50D730F904CBA5
                                                    APIs
                                                      • Part of subcall function 6C6D21FE: InitializeCriticalSectionEx.KERNEL32(6C910E84,00000000,00000000,EFCA8B15,?,?,?,6C6D10B9), ref: 6C6D2273
                                                      • Part of subcall function 6C6D21FE: GetLastError.KERNEL32(EFCA8B15,?,?,?,6C6D10B9), ref: 6C6D22AB
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,6C700B04), ref: 6C7BEF2A
                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,6C700B04), ref: 6C7BEF39
                                                    Strings
                                                    • MZx, xrefs: 6C7BEEFF
                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 6C7BEF34
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$MZx
                                                    • API String ID: 3511171328-1466369552
                                                    • Opcode ID: e639e49763c796f045bb75587c6c288a65f7ff97eb5eb198cc86781f1502af61
                                                    • Instruction ID: 7452e7456939c6bb57363a3df99c84de6f0afdffad651c349b56fcce275a8e38
                                                    • Opcode Fuzzy Hash: e639e49763c796f045bb75587c6c288a65f7ff97eb5eb198cc86781f1502af61
                                                    • Instruction Fuzzy Hash: EDE06D702047808FD7708F29D5097927AF4AB05358F01886DD4A2E3B40E7B9E848CBA1
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C7C0532
                                                    • IsDebuggerPresent.KERNEL32 ref: 6C7C05FE
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C7C0617
                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6C7C0621
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                    • String ID:
                                                    • API String ID: 254469556-0
                                                    • Opcode ID: 5d0466ec7eed0f384701b264cc27a2bce2b06f1d11a64fc6c6fac0ed1e73f185
                                                    • Instruction ID: c1806c5587af86f18d135800672140cde76a30e725c8fda2919abf5358261e4c
                                                    • Opcode Fuzzy Hash: 5d0466ec7eed0f384701b264cc27a2bce2b06f1d11a64fc6c6fac0ed1e73f185
                                                    • Instruction Fuzzy Hash: F331F9B5E013599BDF60DFA4D949BCDBBB8AF08304F1041AAE40DAB240E7759B84CF85
                                                    APIs
                                                    • SetForegroundWindow.USER32(?), ref: 6C712E73
                                                    • IsIconic.USER32(?), ref: 6C712E7C
                                                      • Part of subcall function 6C790CB0: ShowWindow.USER32(?,?,?,?,6C781B94,00000005,0000EA20), ref: 6C790CC1
                                                    • PostMessageW.USER32(?,00000000,?,00000005), ref: 6C712EA4
                                                    • IsIconic.USER32(?), ref: 6C712EAD
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: IconicWindow$ForegroundMessagePostShow
                                                    • String ID:
                                                    • API String ID: 675533722-0
                                                    • Opcode ID: 0242444e6784c610292701731dc11c23ab22a94eb1c9fd1e8d79e14d0bfab0ad
                                                    • Instruction ID: 43bd6234b986c0f520ba44de154a3983e8a279d07935d529aa8937a2bf4b02f7
                                                    • Opcode Fuzzy Hash: 0242444e6784c610292701731dc11c23ab22a94eb1c9fd1e8d79e14d0bfab0ad
                                                    • Instruction Fuzzy Hash: ED01D232314610BBDF141B64ED0CE693B36EF8A365B24022DF9158AAE0DF318C15CA90
                                                    APIs
                                                    • OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,00000000,?,6C70ED10,?,6C8F9398,00000014,6C70EEB3,ImageList_Destroy,6C8F93D8,00000010,6C70F180,00000000,6C70F1C1,3F4930F2,?), ref: 6C702FCA
                                                    • GetLastError.KERNEL32(?,00000000,?,6C70ED10,?,6C8F9398,00000014,6C70EEB3,ImageList_Destroy,6C8F93D8,00000010,6C70F180,00000000,6C70F1C1,3F4930F2,?), ref: 6C703001
                                                      • Part of subcall function 6C70328C: GetModuleFileNameW.KERNEL32(?,?,00000105,?,6C70ED10,?,6C8F9398,00000014,6C70EEB3,ImageList_Destroy,6C8F93D8,00000010,6C70F180,00000000,6C70F1C1,3F4930F2), ref: 6C70333C
                                                      • Part of subcall function 6C70328C: SetLastError.KERNEL32(0000006F,?,6C70ED10,?,6C8F9398,00000014,6C70EEB3,ImageList_Destroy,6C8F93D8,00000010,6C70F180,00000000,6C70F1C1,3F4930F2,?), ref: 6C703350
                                                    Strings
                                                    • IsolationAware function called after IsolationAwareCleanup, xrefs: 6C702FC5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$DebugFileModuleNameOutputString
                                                    • String ID: IsolationAware function called after IsolationAwareCleanup
                                                    • API String ID: 3265401609-2690750368
                                                    • Opcode ID: 5a0593618e98bbfc6e127f96583cf4e6084fcaa0f11dfe52daaf0c0d69c6188d
                                                    • Instruction ID: 0b0954299d0f4b63830aa01a35b9c04392f1f7f4d2c32a39d51d35cd67877859
                                                    • Opcode Fuzzy Hash: 5a0593618e98bbfc6e127f96583cf4e6084fcaa0f11dfe52daaf0c0d69c6188d
                                                    • Instruction Fuzzy Hash: 8FF0C2B270B521575F2856E6DB49D6A77FA9B1BB8D334093AE812C3D00EA20D491CBE4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DeleteFileFolderPath_strlen
                                                    • String ID:
                                                    • API String ID: 1809683544-0
                                                    • Opcode ID: cf62a01962a4b3e8a93df968623a16d884d75a58771927aab6859a95394aefa5
                                                    • Instruction ID: a084b4b734aa148413bd7913e83074461eb1a5b6ccb1e1710a58aad2341fbf94
                                                    • Opcode Fuzzy Hash: cf62a01962a4b3e8a93df968623a16d884d75a58771927aab6859a95394aefa5
                                                    • Instruction Fuzzy Hash: E91204B2E002188BDB14CFA8C9807DDB7F6EF49318F144629D429F7781E7719D468B95
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C890195
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C8901DF
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C8902A5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 3b556272e01774ad5037e77138a7ab21df3f1813efe1771b82b7b0177e0df51b
                                                    • Instruction ID: b4a922af3d95e8002ff856ed4e499c886cf213c741239e8505ec971e41903a2f
                                                    • Opcode Fuzzy Hash: 3b556272e01774ad5037e77138a7ab21df3f1813efe1771b82b7b0177e0df51b
                                                    • Instruction Fuzzy Hash: D161DD319412479FEB398F2DCE81BAA73B9EF08308F104979E914C7A81E734E985DB50
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,6C7BF630), ref: 6C87C380
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,6C7BF630), ref: 6C87C38A
                                                    • UnhandledExceptionFilter.KERNEL32(6C6D93F6,?,?,?,?,?,6C7BF630), ref: 6C87C397
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: 5b252e95854e248bb0c21b88c5e72a5d3f43658b5e15ffb565ef126d986a2ea3
                                                    • Instruction ID: 604422d925970cf9d02d5a4825afed384bef6231363025726e401135dc7d80f9
                                                    • Opcode Fuzzy Hash: 5b252e95854e248bb0c21b88c5e72a5d3f43658b5e15ffb565ef126d986a2ea3
                                                    • Instruction Fuzzy Hash: 7831E67491121C9BCB21DF29DD88BCCBBB8BF08314F5045EAE41CA7690E7749B858F55
                                                    APIs
                                                    • GetKeyState.USER32(00000010), ref: 6C76C3F1
                                                    • GetKeyState.USER32(00000011), ref: 6C76C3FE
                                                    • GetKeyState.USER32(00000012), ref: 6C76C40B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: State
                                                    • String ID:
                                                    • API String ID: 1649606143-0
                                                    • Opcode ID: 9c6353dbfcf5d95808e52a68ebd074953dde25f7a0380f8b9af75bb650fa33ec
                                                    • Instruction ID: 6c377a67c5e211e9b70295dcb955cde9eb24c22b0006b8477da60203fac2151d
                                                    • Opcode Fuzzy Hash: 9c6353dbfcf5d95808e52a68ebd074953dde25f7a0380f8b9af75bb650fa33ec
                                                    • Instruction Fuzzy Hash: 64F030F43442449BEF01FB629A48FB07F749B017CAF148474EEA597E41D7A0C581E661
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3
                                                    • String ID:
                                                    • API String ID: 431132790-0
                                                    • Opcode ID: 6af834fa1efe16c966001ecec35198bdce47a50e3a68b7723bfa19173d972dfe
                                                    • Instruction ID: 98b38852cd27496d1641e756a27a35ef09b1ab2a286fe6b34ce4a02fcbe5210c
                                                    • Opcode Fuzzy Hash: 6af834fa1efe16c966001ecec35198bdce47a50e3a68b7723bfa19173d972dfe
                                                    • Instruction Fuzzy Hash: 29E17A70A00209DFDB04DF64CA98BBE77B5BF49308F644069E815ABB90DF35E961CB91
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C70B93C
                                                    • GetWindowRect.USER32(?,?), ref: 6C70B9AC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow
                                                    • String ID:
                                                    • API String ID: 861336768-0
                                                    • Opcode ID: d1acdda7b1339a24aab5013c72a6aa6153632dcf809c567ff3b97a44029a8c25
                                                    • Instruction ID: 55d1c3eb42810f7b9391e789b393371eca45a61fa1ef6bc13fb213da2974d8c0
                                                    • Opcode Fuzzy Hash: d1acdda7b1339a24aab5013c72a6aa6153632dcf809c567ff3b97a44029a8c25
                                                    • Instruction Fuzzy Hash: C4613BB1B0521ADFCB09CFB8C295AADB7F5FF49304F244179E416A3680DB306A80CB91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: IconicVisibleWindow
                                                    • String ID:
                                                    • API String ID: 1797901696-0
                                                    • Opcode ID: b7c9a246964dca069cf04a01bbc3de17ad11994532704db24cb11bf178987f8f
                                                    • Instruction ID: e40154d84c5c17b78dc13b766338e00aea1ff531f47abf091de263b84fd72363
                                                    • Opcode Fuzzy Hash: b7c9a246964dca069cf04a01bbc3de17ad11994532704db24cb11bf178987f8f
                                                    • Instruction Fuzzy Hash: DEF0273371512027960A167BAD089FDFA6DAF8A7397014337EE71A3DE0DBA09C11D2E1
                                                    Strings
                                                    • 0123456789ABCDEFabcdef-+XxPp, xrefs: 6C6E7EA8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID: 0123456789ABCDEFabcdef-+XxPp
                                                    • API String ID: 593203224-3606100449
                                                    • Opcode ID: c6a81fc055f5c354d78d17b5d382d793a1d5af2f95847c0eba95abe6ec833a49
                                                    • Instruction ID: 881cfc4a6168f6749d543d6d630d02089bf95344055babe7473ccb9bf7618c0a
                                                    • Opcode Fuzzy Hash: c6a81fc055f5c354d78d17b5d382d793a1d5af2f95847c0eba95abe6ec833a49
                                                    • Instruction Fuzzy Hash: 99B2F270A0A2898FDF15CF6CC8507DDBBB2AF4D308F28465BD865ABB91D7309845CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID:
                                                    • API String ID: 4218353326-0
                                                    • Opcode ID: 55e4982372593f1ee3b50a860b62c09867d53cba109a8e0563d937e2986e6097
                                                    • Instruction ID: 0a7f96db5cc4605c4a7743ba4666420ee2db6c2c0dfc36949a6a9dbbd15cd702
                                                    • Opcode Fuzzy Hash: 55e4982372593f1ee3b50a860b62c09867d53cba109a8e0563d937e2986e6097
                                                    • Instruction Fuzzy Hash: 774205B2E062589FCB04CFACD8806DDBFB6AF89318F29412AE415B7740DB709845CB95
                                                    Strings
                                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 6C6E6A2E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                                    • API String ID: 593203224-2799312399
                                                    • Opcode ID: 8c34601bd82b5163c216c4dd94dc56630715851f66f7c4b2381428418325b72f
                                                    • Instruction ID: 3ab7318f184a68537d8964bd93ca5fac9ec7753399320a14386f477b1a0dcedd
                                                    • Opcode Fuzzy Hash: 8c34601bd82b5163c216c4dd94dc56630715851f66f7c4b2381428418325b72f
                                                    • Instruction Fuzzy Hash: 5452E67090E24D9FDF04CF68C4507DDBBB2AF4A318F28825AD465AB782D731E946CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: std::invalid_argument::invalid_argument
                                                    • String ID: vector too long
                                                    • API String ID: 2141394445-2873823879
                                                    • Opcode ID: 47958be7a97a4aea8d698e6d304d4be6e4ad7a784dde34072fdaf616fc8dc5af
                                                    • Instruction ID: 60b7757f63058b3689a364b5362ce404605b80abbac107c5561893d27d0de685
                                                    • Opcode Fuzzy Hash: 47958be7a97a4aea8d698e6d304d4be6e4ad7a784dde34072fdaf616fc8dc5af
                                                    • Instruction Fuzzy Hash: 121216B26043046FC7149E69DD9096FBBEAEFC535CF198A3CF45983B50EA31E8448792
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3_ParentWindow$H_prolog3Rect$Empty$DataData::RedrawText
                                                    • String ID: .\UserImages.bmp
                                                    • API String ID: 2201018737-1379135857
                                                    • Opcode ID: 802028b6eeee2421fd63bdb4aa6f095d1e5d637766b90dcf17275b79164d2ab2
                                                    • Instruction ID: d874e6dfc943c826b17903192c32965c8a8badadf4f248ce1311dd4c6d4e2e81
                                                    • Opcode Fuzzy Hash: 802028b6eeee2421fd63bdb4aa6f095d1e5d637766b90dcf17275b79164d2ab2
                                                    • Instruction Fuzzy Hash: 48327270E002089FDB04CF64C888BEDB7B5FF84708F24C56DE519AB691DB75A94ACB94
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: WA
                                                    • API String ID: 0-3113787599
                                                    • Opcode ID: 91f7eef3cf72b462895a7ca5169fb2ef08a0d10752481157739d0cc78668646a
                                                    • Instruction ID: 93d3a92fadd765484fba17ba6862e7c120ec1dbee9b51441fb28ed770ffc0465
                                                    • Opcode Fuzzy Hash: 91f7eef3cf72b462895a7ca5169fb2ef08a0d10752481157739d0cc78668646a
                                                    • Instruction Fuzzy Hash: D632627451F3809FD71AAF18C0A566ABFE2AFDA348F244A4FE5C607B61C6364445CB0B
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6C7C01FB
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: FeaturePresentProcessor
                                                    • String ID:
                                                    • API String ID: 2325560087-0
                                                    • Opcode ID: 12497c519f729c05cfa0ac4d5fb1feb009e2210f03e13be8f952167adaf1a611
                                                    • Instruction ID: 940dc6a677fbab6257124f1fd7b80ebcc2de56005923ec3d7944869ef79e7028
                                                    • Opcode Fuzzy Hash: 12497c519f729c05cfa0ac4d5fb1feb009e2210f03e13be8f952167adaf1a611
                                                    • Instruction Fuzzy Hash: 6BA11AB1B196468FDB04CF55CA8279EBBB1FB49328F28826ED415EB780D3749940CF91
                                                    APIs
                                                    • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,6C88677C,?,?), ref: 6C88635A
                                                      • Part of subcall function 6C883921: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C887109,?,00000000,-00000008), ref: 6C883982
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ByteCharInformationMultiTimeWideZone
                                                    • String ID:
                                                    • API String ID: 1123094072-0
                                                    • Opcode ID: eda3750dff0cc932a3c45f6318bf35049bf6d0b9cdf80503ce218aeb02e5a71c
                                                    • Instruction ID: 41818c499213871ea9d32e93c8df98a54b0e238e55642c461c744fd01006a846
                                                    • Opcode Fuzzy Hash: eda3750dff0cc932a3c45f6318bf35049bf6d0b9cdf80503ce218aeb02e5a71c
                                                    • Instruction Fuzzy Hash: FC41F5B1911214ABDF209FA9CE02E9E7B78EF01368F254875E514E7EA0E7309900CBD0
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C890447
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: a361cef02304d95eb990ea840a31bd4ce5b07a39a2c92df755e2eb71dbfd2d4b
                                                    • Instruction ID: 36ebdc7818a8dc2e42641923b12c6138a67aae1e03f8b11ceeeef8bfbad6f500
                                                    • Opcode Fuzzy Hash: a361cef02304d95eb990ea840a31bd4ce5b07a39a2c92df755e2eb71dbfd2d4b
                                                    • Instruction Fuzzy Hash: 5621C532609246ABDB388A1DDE41AAB73B8EF4931CF10447EE901D7A40EB34E945CB50
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C890567
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 863f1cd37830d1f735467f4efcd8550141dc8c65cfb368e14283f8041f99039d
                                                    • Instruction ID: 4386c6b84878702c065d9d1e3f2ce23248e55843d5026e9a2900fa761e59d89e
                                                    • Opcode Fuzzy Hash: 863f1cd37830d1f735467f4efcd8550141dc8c65cfb368e14283f8041f99039d
                                                    • Instruction Fuzzy Hash: 31110632605206AFDB248B2CDE459EA73F8EF09318B10447AE511D7A80EB38EE09C750
                                                    APIs
                                                    • EnumSystemLocalesW.KERNEL32(6C890141,00000001,00000000,?,-00000050,?,6C88FF31,00000000,-00000002,00000000,?,00000055,?), ref: 6C890118
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2099609381-0
                                                    • Opcode ID: 8d155b00ba84eb9de540c8f787947b58f8804307186db947a910da40fab1efdd
                                                    • Instruction ID: f31739538da7be6db6c97f1e3bd94b2cf99eef8674502fccd2beeb93875a408d
                                                    • Opcode Fuzzy Hash: 8d155b00ba84eb9de540c8f787947b58f8804307186db947a910da40fab1efdd
                                                    • Instruction Fuzzy Hash: CE11C6362047059FDB289F3DC9906AABBA1FF84359B18493CD94787F40D375A942C740
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6C89049D,00000000,00000000,?), ref: 6C8906EC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: f2eb3f91b3969df0cb74d35898b0f1b15c2a5fd55219c3b128c915d90e53b702
                                                    • Instruction ID: a803db7c455ef9b747568b97395254baccd593a90ae3f60dccb964704e7b4d3c
                                                    • Opcode Fuzzy Hash: f2eb3f91b3969df0cb74d35898b0f1b15c2a5fd55219c3b128c915d90e53b702
                                                    • Instruction Fuzzy Hash: CE01DB36A00156BFDB28862CD945BBA3BA8EB45768F154C38DC52A3580EB75FD41CAD0
                                                    APIs
                                                    • EnumSystemLocalesW.KERNEL32(6C8903F3,00000001,?,?,-00000050,?,6C88FEF9,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 6C8903DE
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2099609381-0
                                                    • Opcode ID: 41a9f04a6ab70d431bfd866fc761dc95d2fbc1f99ce7f59802ce9d186f89d7dc
                                                    • Instruction ID: 85113b468e5c12e5065cd6c3cd854beb15de0fe45abd03c6229f628ea11daf14
                                                    • Opcode Fuzzy Hash: 41a9f04a6ab70d431bfd866fc761dc95d2fbc1f99ce7f59802ce9d186f89d7dc
                                                    • Instruction Fuzzy Hash: 13F0C2362043445FDB345E3DD9C0A6A7BA1EF8536CB19493CFA458BE80D7B1A842E650
                                                    APIs
                                                      • Part of subcall function 6C87C939: EnterCriticalSection.KERNEL32(?,?,6C883F1C,6C6F82D0,6C909470,00000008,6C883E0E,?,6C880602,6C6F82D0), ref: 6C87C948
                                                    • EnumSystemLocalesW.KERNEL32(6C88601E,00000001,6C909550,0000000C,6C885908,-00000050), ref: 6C886063
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                    • String ID:
                                                    • API String ID: 1272433827-0
                                                    • Opcode ID: 96662b9392872e25b08db1962b343abc4324814b297b5156803e667d7a18eb6d
                                                    • Instruction ID: 5de42c293f47ffb8b70cefc6552bf067cfc09122c8596eb02263bd52bd061a05
                                                    • Opcode Fuzzy Hash: 96662b9392872e25b08db1962b343abc4324814b297b5156803e667d7a18eb6d
                                                    • Instruction Fuzzy Hash: A8F0A9B2B10204EFEB20DFA8E545B8D77F0EB49324F10452AE400EBB80D7759804CF80
                                                    APIs
                                                    • EnumSystemLocalesW.KERNEL32(6C890513,00000001,?,?,?,6C88FF53,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 6C8904FF
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2099609381-0
                                                    • Opcode ID: 4f85e703bef1aa05d959bd0d259f3e11dd53cc0e33c754cd79c40e41c999b400
                                                    • Instruction ID: 7fa56b227b7d335f6077aa45133437f7fba7acb9348416b6b60f996d9b79fc50
                                                    • Opcode Fuzzy Hash: 4f85e703bef1aa05d959bd0d259f3e11dd53cc0e33c754cd79c40e41c999b400
                                                    • Instruction Fuzzy Hash: F9F05C3630024857CB24AF3EC95476A7FA0EFC1718B0A0468EA058BE40C375D942C7D0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Iconic
                                                    • String ID:
                                                    • API String ID: 110040809-0
                                                    • Opcode ID: f9377d871803d9cfe9626e9ff28a290bc4a43ae859566151c84ac2a0a075ac9a
                                                    • Instruction ID: 9a37e2791572f94822c55212cec5f39c583a0b57a89362f63444bd3bced51444
                                                    • Opcode Fuzzy Hash: f9377d871803d9cfe9626e9ff28a290bc4a43ae859566151c84ac2a0a075ac9a
                                                    • Instruction Fuzzy Hash: 06E026323290101FEB185A38EE4CBBA7799FF81215F04093DE0A2C3E90DF50AC1A8760
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,6C8855EE,?,20001004,00000000,00000002,?,?,6C884500), ref: 6C885A40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 0e49ca3de9f840d75d38c67f4683ab9a3729759e709bb3f8095f3c18ae4f17d9
                                                    • Instruction ID: 13632e216b0fb2c470c7e5f4f7da9f079c5e17ff19381df70945b30e1fe2b674
                                                    • Opcode Fuzzy Hash: 0e49ca3de9f840d75d38c67f4683ab9a3729759e709bb3f8095f3c18ae4f17d9
                                                    • Instruction Fuzzy Hash: 5BE04F31942219BBDF225F65DD48EDE3F2AEF457A5F104420FC1666A10CB768921DBD0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID:
                                                    • API String ID: 593203224-0
                                                    • Opcode ID: e3172e74b2294649dd12c3c4c4f5108b17f10350b9b8ecbeef0f59ab2ad83e7b
                                                    • Instruction ID: e847de8d3da8687486bc4851ef90f62464249f0ee0c8b2f5396af162f380d4ad
                                                    • Opcode Fuzzy Hash: e3172e74b2294649dd12c3c4c4f5108b17f10350b9b8ecbeef0f59ab2ad83e7b
                                                    • Instruction Fuzzy Hash: EC32D271E052088FDB14CFA8C8946EEB7B6BF49318F14462AE916EB780D734ED04CB65
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd1aac542edc429d71cb518c643d948f271d959a540291e137b2a1eb494a4d59
                                                    • Instruction ID: 3a65dd7677d4e41e943309a2710691b839133292c0ccaf30a2a2f592a6680dcf
                                                    • Opcode Fuzzy Hash: dd1aac542edc429d71cb518c643d948f271d959a540291e137b2a1eb494a4d59
                                                    • Instruction Fuzzy Hash: 2C519F72D00119EFDB24CF99C940AEEBBB5EFC8304F098498E915AB201D7349A40CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction ID: 55caa56ba3eb244c68113c78fbb7d3a0b7399c0767ff551a814e487db5758190
                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                    • Instruction Fuzzy Hash: B1119BB724308247DE10AD3FD6B46A7B3A5EBC532C7384F7AE0618BE56D1A3E0009600
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 201a5f34c245a480983ceff37fb970a315f7a8103705b6bc45149420d5b60e8e
                                                    • Instruction ID: 9b286c7102be51a6d53c2c4fed758e666d499cfe2aba09498374bfebce7d6f9d
                                                    • Opcode Fuzzy Hash: 201a5f34c245a480983ceff37fb970a315f7a8103705b6bc45149420d5b60e8e
                                                    • Instruction Fuzzy Hash: AA115EB45082449FC720DF59C1C8A0D77F5EB89728F2A0D99E488E7B10D735ED84CB66
                                                    APIs
                                                    • OpenThemeData.UXTHEME(?,WINDOW,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DB3E
                                                    • OpenThemeData.UXTHEME(?,TOOLBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DB5D
                                                    • OpenThemeData.UXTHEME(?,BUTTON,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DB7C
                                                    • OpenThemeData.UXTHEME(?,STATUS,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DB9B
                                                    • OpenThemeData.UXTHEME(?,REBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DBBA
                                                    • OpenThemeData.UXTHEME(?,COMBOBOX,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DBD9
                                                    • OpenThemeData.UXTHEME(?,PROGRESS,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DBF8
                                                    • OpenThemeData.UXTHEME(?,HEADER,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DC17
                                                    • OpenThemeData.UXTHEME(?,SCROLLBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DC36
                                                    • OpenThemeData.UXTHEME(?,EXPLORERBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DC55
                                                    • OpenThemeData.UXTHEME(?,TREEVIEW,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DC74
                                                    • OpenThemeData.UXTHEME(?,STARTPANEL,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DC93
                                                    • OpenThemeData.UXTHEME(?,TASKBAND,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DCB2
                                                    • OpenThemeData.UXTHEME(?,TASKBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DCD1
                                                    • OpenThemeData.UXTHEME(?,SPIN,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DCF0
                                                    • OpenThemeData.UXTHEME(?,TAB,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DD0F
                                                    • OpenThemeData.UXTHEME(?,TOOLTIP,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DD2E
                                                    • OpenThemeData.UXTHEME(?,TRACKBAR,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DD4D
                                                    • OpenThemeData.UXTHEME(00000000,MENU,?,?,6C74D3F3,?,6C74DF19,00000004,6C6D1EF9,00000000,?,?,?,?,6C6D18FF), ref: 6C74DD68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DataOpenTheme
                                                    • String ID: BUTTON$COMBOBOX$EXPLORERBAR$HEADER$MENU$PROGRESS$REBAR$SCROLLBAR$SPIN$STARTPANEL$STATUS$TAB$TASKBAND$TASKBAR$TOOLBAR$TOOLTIP$TRACKBAR$TREEVIEW$WINDOW
                                                    • API String ID: 1744092376-1233129369
                                                    • Opcode ID: e380df64092e70e17324146e531cd11995f72b864ae63a5976c7429f87103f1e
                                                    • Instruction ID: cc79c1a4d388203ac20ed9e8d9f2b7c17f7cba5088634f494b48318a0a80633e
                                                    • Opcode Fuzzy Hash: e380df64092e70e17324146e531cd11995f72b864ae63a5976c7429f87103f1e
                                                    • Instruction Fuzzy Hash: CF61E9F8B44311AB8B10AFB9DB4DC19BAB8BB1A7483454975B991C7F10EB74D841CB88
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C703CAB
                                                    • lstrcmpA.KERNEL32(?,6C8E41E4,00000008,6C703C15,?,?,?,?,?,00000004), ref: 6C703CBB
                                                    • lstrcmpA.KERNEL32(?,6C8E4AA8,?,?,?,00000004), ref: 6C703CD7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: lstrcmp$H_prolog3
                                                    • String ID: Automation$Embedding$Register$RegisterPerUser$Regserver$RegserverPerUser$RestartByRestartManager$Unregister$UnregisterPerUser$Unregserver$UnregserverPerUser$dde$ddenoshow
                                                    • API String ID: 477540313-844245956
                                                    • Opcode ID: 23968b4fa554e5e5dc12a6d05b57c655d6babe3ba06d4272c93fbc740307e4bf
                                                    • Instruction ID: a45b92a988622cfc3d385ae832da271bb98003cc8526a5ffc1f7c79caeabc470
                                                    • Opcode Fuzzy Hash: 23968b4fa554e5e5dc12a6d05b57c655d6babe3ba06d4272c93fbc740307e4bf
                                                    • Instruction Fuzzy Hash: 515196B07542497AEA309B619F8CF7736BCEB9774DF000B28B265A6AC0C7799804C771
                                                    APIs
                                                    • RegisterClipboardFormatW.USER32(Native), ref: 6C77D780
                                                    • RegisterClipboardFormatW.USER32(OwnerLink), ref: 6C77D78D
                                                    • RegisterClipboardFormatW.USER32(ObjectLink), ref: 6C77D79B
                                                    • RegisterClipboardFormatW.USER32(Embedded Object), ref: 6C77D7A9
                                                    • RegisterClipboardFormatW.USER32(Embed Source), ref: 6C77D7B7
                                                    • RegisterClipboardFormatW.USER32(Link Source), ref: 6C77D7C5
                                                    • RegisterClipboardFormatW.USER32(Object Descriptor), ref: 6C77D7D3
                                                    • RegisterClipboardFormatW.USER32(Link Source Descriptor), ref: 6C77D7E1
                                                    • RegisterClipboardFormatW.USER32(FileName), ref: 6C77D7EF
                                                    • RegisterClipboardFormatW.USER32(FileNameW), ref: 6C77D7FD
                                                    • RegisterClipboardFormatW.USER32(Rich Text Format), ref: 6C77D80B
                                                    • RegisterClipboardFormatW.USER32(RichEdit Text and Objects), ref: 6C77D819
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClipboardFormatRegister
                                                    • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
                                                    • API String ID: 1228543026-2889995556
                                                    • Opcode ID: d0827c0e153090f33f31249943a78f15808e8acca1bfc90d54f829c63633fb7e
                                                    • Instruction ID: 3b8f287d3bdfe93aba3061e62aa95a20b4a5879da00057c88f4ab24d3e63a63a
                                                    • Opcode Fuzzy Hash: d0827c0e153090f33f31249943a78f15808e8acca1bfc90d54f829c63633fb7e
                                                    • Instruction Fuzzy Hash: 38114771A137209BCF305FB9A90C84A7BB0AA0B6573408D2DF5AA87B11D678D840EF85
                                                    APIs
                                                      • Part of subcall function 6C790927: GetWindowLongW.USER32(?,000000EC), ref: 6C790934
                                                    • GetClientRect.USER32(?,00000000), ref: 6C721B1F
                                                    • CopyRect.USER32(?,?), ref: 6C721B4C
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DB7
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DC4
                                                    • IntersectRect.USER32(6C854F0B,?,?), ref: 6C721B9F
                                                    • SetRectEmpty.USER32(6C854F0B), ref: 6C721BAD
                                                    • IntersectRect.USER32(?,?,?), ref: 6C721BD6
                                                    • SetRectEmpty.USER32(?), ref: 6C721BE4
                                                    • IsRectEmpty.USER32(6C854F0B), ref: 6C721BEE
                                                    • IsRectEmpty.USER32(?), ref: 6C721BFC
                                                    • GetWindowRect.USER32(?,?), ref: 6C721C1E
                                                    • GetWindowRect.USER32(00000000,?), ref: 6C721C41
                                                    • UnionRect.USER32(?,?,?), ref: 6C721C5D
                                                    • EqualRect.USER32(?,?), ref: 6C721C6B
                                                    • GetWindowRect.USER32(?,?), ref: 6C721CFF
                                                    • IsRectEmpty.USER32(6C854F0B), ref: 6C721D60
                                                    • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 6C721D7C
                                                    • RedrawWindow.USER32(00000000,?,00000000,00000185), ref: 6C721D90
                                                    • IsRectEmpty.USER32(?), ref: 6C721DA4
                                                    • EqualRect.USER32(6C854F0B,?), ref: 6C721DB6
                                                    • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 6C721DD2
                                                    • RedrawWindow.USER32(00000000,?,00000000,00000185), ref: 6C721DE6
                                                    • UpdateWindow.USER32(00000000), ref: 6C721DF5
                                                    • IsRectEmpty.USER32(6C854F0B), ref: 6C721E3D
                                                    • InvalidateRect.USER32(?,6C854F0B,00000001), ref: 6C721E50
                                                    • IsRectEmpty.USER32(?), ref: 6C721E5A
                                                    • EqualRect.USER32(6C854F0B,?), ref: 6C721E6C
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C721E7F
                                                    • UpdateWindow.USER32(?), ref: 6C721E88
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                                                    • String ID:
                                                    • API String ID: 4119827998-0
                                                    • Opcode ID: 084b21a1cca1d9a342ba5d0324d7b6cd6d1add9a24362824ea672990a638bb99
                                                    • Instruction ID: 1a7c0489b654a45c8245b656ade9d54307b961dca89ff685c0c8082833745609
                                                    • Opcode Fuzzy Hash: 084b21a1cca1d9a342ba5d0324d7b6cd6d1add9a24362824ea672990a638bb99
                                                    • Instruction Fuzzy Hash: 77D1F872A002099FDF11CFA4CA48FDEB7B9BF09309F104265E919E7151DB75AE84CB51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C791CFB
                                                      • Part of subcall function 6C791C1B: __EH_prolog3.LIBCMT ref: 6C7919E7
                                                      • Part of subcall function 6C791C1B: GlobalLock.KERNEL32(?), ref: 6C791A09
                                                    • GetProcAddress.KERNEL32(?,MAPISendMail), ref: 6C791D59
                                                    • GetTempPathW.KERNEL32(00000104,?,?,?,00000000,?,?,6C784AD4,?), ref: 6C791DD1
                                                      • Part of subcall function 6C70EC7A: swprintf.LIBCMT ref: 6C70ECA4
                                                      • Part of subcall function 6C70EC7A: GetFileAttributesW.KERNEL32(?,6C784AD4,?), ref: 6C70ECAF
                                                    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C791E76
                                                    • PathFindExtensionW.SHLWAPI(?), ref: 6C791EB6
                                                    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000104,00000000,00000000,00000000), ref: 6C791F80
                                                    • SetCapture.USER32(?,00000000,?,00000000), ref: 6C791FFC
                                                    • SetFocus.USER32(00000000,00000000), ref: 6C792009
                                                    • ReleaseCapture.USER32 ref: 6C792033
                                                    • SetActiveWindow.USER32(00000000,00000001), ref: 6C792047
                                                    • SetActiveWindow.USER32(?), ref: 6C792050
                                                    • EnableWindow.USER32(?,00000001), ref: 6C792073
                                                    • GetProfileIntW.KERNEL32(MAIL,MAPI,00000000), ref: 6C7920ED
                                                    • SearchPathW.KERNEL32(00000000,MAPI32.DLL,00000000,00000000,00000000,00000000,?,00000000,?,?,6C7921F3,00000884,?,?,00000000), ref: 6C792101
                                                    • GetMenuState.USER32(?,?,00000400), ref: 6C792145
                                                    • GetMenuState.USER32(?,?,00000400), ref: 6C792157
                                                    • RemoveMenu.USER32(?,?,00000400,?,00000000,?,?,6C7921F3,00000884,?,?,00000000,?,?,6C784AD4,?), ref: 6C79216A
                                                    • RemoveMenu.USER32(?,?,00000400,?,00000000,?,?,6C7921F3,00000884,?,?,00000000,?,?,6C784AD4,?), ref: 6C7921A0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$PathWindow$ActiveByteCaptureCharMultiRemoveStateWide$AddressAttributesEnableExtensionFileFindFocusGlobalH_prolog3H_prolog3_LockProcProfileReleaseSearchTempswprintf
                                                    • String ID: MAIL$MAPI$MAPI32.DLL$MAPISendMail$afx
                                                    • API String ID: 1563932423-2112953990
                                                    • Opcode ID: 52eea5260ab617d538f3f04866265f3c1dde5ae3768c4eaf8aa274ce0927d9b1
                                                    • Instruction ID: d3cafe47cce285acae8e28000dcf8c8f8b0751520fdfe08e8b824890eaf6a4cd
                                                    • Opcode Fuzzy Hash: 52eea5260ab617d538f3f04866265f3c1dde5ae3768c4eaf8aa274ce0927d9b1
                                                    • Instruction Fuzzy Hash: 6BF1C371A01619AFDB20DB64CE88FA9B7B8FF09358F1041A9E51997B90DB30ED54CF90
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C77DBC5
                                                    • LoadRegTypeLib.OLEAUT32(?,?,00000001,?,?), ref: 6C77DBF2
                                                    • StringFromGUID2.OLE32(?,?,00000027,00000694,6C6FC2AC,6C8AB87C,00000001,00000000,00000000), ref: 6C77DC09
                                                    • swprintf.LIBCMT ref: 6C77DC52
                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C77DC9F
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00030019,?,?,?,?,?), ref: 6C77DCD3
                                                    • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,HELPDIR,000000FF,?,?,?,?), ref: 6C77DD09
                                                    • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,FLAGS,000000FF,?,?,?,?), ref: 6C77DD2D
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00030019,?,?,?,?,?), ref: 6C77DD5D
                                                    • RegOpenKeyExW.ADVAPI32(?,win64,00000000,00020000,?,?,?,?,?), ref: 6C77DD7F
                                                    • RegCloseKey.ADVAPI32 ref: 6C77DDBF
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 6C77DD93
                                                      • Part of subcall function 6C77E23B: __EH_prolog3.LIBCMT ref: 6C77E242
                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C77DDD9
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 6C77DDED
                                                    • RegEnumKeyW.ADVAPI32(?,00000001,?,00000104), ref: 6C77DE1E
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 6C77DE38
                                                    • LoadRegTypeLib.OLEAUT32(?,?,00000001,?,?), ref: 6C77DE94
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 6C77DEB2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Close$EnumOpenString$CompareLoadType$FromH_prolog3H_prolog3_swprintf
                                                    • String ID: FLAGS$HELPDIR$TYPELIB\%Ts$win32$win64
                                                    • API String ID: 3736468143-1045325687
                                                    • Opcode ID: 7c460f9372caf7850fa204f687d824f4ca8af2894dabce27594e7626de2ccf11
                                                    • Instruction ID: 9b62cd611473da221a36acb5f97fd87206e1fdac38257f5eca61bf0e433ba489
                                                    • Opcode Fuzzy Hash: 7c460f9372caf7850fa204f687d824f4ca8af2894dabce27594e7626de2ccf11
                                                    • Instruction Fuzzy Hash: F6915EB090512CAFDF218F10CD48FE97A7AFB99358F1042A5F519E2650DB728EA4DF60
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C744647
                                                    • CopyImage.USER32(00000004,00000000,00000000,00000000,00002000), ref: 6C74467D
                                                      • Part of subcall function 6C745C2A: __EH_prolog3_GS.LIBCMT ref: 6C745C34
                                                      • Part of subcall function 6C745C2A: GetObjectW.GDI32(00000004,00000018,?), ref: 6C745C59
                                                      • Part of subcall function 6C745C2A: GetObjectW.GDI32(00000004,00000054,?), ref: 6C745C9E
                                                    • GetObjectW.GDI32(00000004,00000018,?), ref: 6C7446B7
                                                    • DeleteObject.GDI32(00000004), ref: 6C74473C
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C74476A
                                                    • GetObjectW.GDI32(00000004,00000018,?), ref: 6C744786
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 6C7447D0
                                                    • SelectObject.GDI32(?,?), ref: 6C7447F3
                                                    • SelectObject.GDI32(?,00000004), ref: 6C74482A
                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C744850
                                                    • SelectObject.GDI32(?,00000000), ref: 6C74486B
                                                    • CreateCompatibleDC.GDI32(?), ref: 6C74489B
                                                    • SelectObject.GDI32(?,?), ref: 6C7448B9
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C7448F8
                                                    • SelectObject.GDI32(?,00000004), ref: 6C74490D
                                                    • BitBlt.GDI32(?,?,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C744943
                                                    • SelectObject.GDI32(?,?), ref: 6C744955
                                                    • SelectObject.GDI32(?,00000000), ref: 6C744966
                                                    • DeleteObject.GDI32(?), ref: 6C744977
                                                    • DeleteObject.GDI32(00000004), ref: 6C7449BF
                                                    • SelectObject.GDI32(?,?), ref: 6C7449D7
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7449E8
                                                    • DeleteObject.GDI32(?), ref: 6C7449F4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$Delete$CompatibleCreate$H_prolog3_$BitmapCopyImage
                                                    • String ID:
                                                    • API String ID: 1780083495-0
                                                    • Opcode ID: 9b0445888820a7fb134a006cc5ec81edad63de3d0178916ee828b3873014e822
                                                    • Instruction ID: 598486a79a32c818553d870ebc17f5fd1e9655e3ca1214b0075cc8c88e162636
                                                    • Opcode Fuzzy Hash: 9b0445888820a7fb134a006cc5ec81edad63de3d0178916ee828b3873014e822
                                                    • Instruction Fuzzy Hash: 83A14F71A01629EFDF218F61DD48BDABBB8BF19345F0081E4E518A3650DB309E94EF90
                                                    APIs
                                                    • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C75CED6
                                                    • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C75CF00
                                                    • GetCapture.USER32 ref: 6C75CF16
                                                    • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C75CF25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Capture
                                                    • String ID: #32768$AfxOldWndProc423
                                                    • API String ID: 1665607226-2141921550
                                                    • Opcode ID: 521000b1197d674b5d4572421362a7e4a6226c5a4157545e672308c0d0181eba
                                                    • Instruction ID: 10c2e8059c152cc865cca765b698b4ff9cd1aa52d400e6c36c7def3da4e2434a
                                                    • Opcode Fuzzy Hash: 521000b1197d674b5d4572421362a7e4a6226c5a4157545e672308c0d0181eba
                                                    • Instruction Fuzzy Hash: F381E371600219AFDF219F20DE8DFAA7B78EF59799F5000A4F915A7A80CF708D51CBA1
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C701A7D
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C701AD2
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C701AEA
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C701B02
                                                    • GetObjectW.GDI32(00000004,00000018,?), ref: 6C701B22
                                                    • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6C701B48
                                                    • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,6C8AE36C), ref: 6C701B6B
                                                    • CreatePatternBrush.GDI32(?), ref: 6C701B7D
                                                    • DeleteObject.GDI32(?), ref: 6C701BAC
                                                    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C701BBD
                                                    • GetPixel.GDI32(?,00000000,00000000), ref: 6C701C05
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C701C2B
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00EE0086), ref: 6C701C53
                                                    • FillRect.USER32(?,?,?), ref: 6C701CB5
                                                      • Part of subcall function 6C702E58: __EH_prolog3.LIBCMT ref: 6C702E5F
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C701CE3
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 6C701CFE
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C701D15
                                                    • DeleteDC.GDI32(00000000), ref: 6C701D82
                                                    • DeleteDC.GDI32(00000000), ref: 6C701D9E
                                                    • DeleteDC.GDI32(00000000), ref: 6C701DBD
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Create$Delete$BitmapCompatible$Object$BrushFillH_prolog3H_prolog3_PatternPixelRect
                                                    • String ID:
                                                    • API String ID: 308707564-0
                                                    • Opcode ID: 2fe06163a28c0653cdafc3da3288766686156498bd837409288e44b19ab4cda9
                                                    • Instruction ID: b2b7db4d77bfe48d81571c0a35f97f114ebfce752e87f059d765d198b6de08e8
                                                    • Opcode Fuzzy Hash: 2fe06163a28c0653cdafc3da3288766686156498bd837409288e44b19ab4cda9
                                                    • Instruction Fuzzy Hash: AFB1D3B1E01208AFDF219FE0DE89AEEBBB9BF08348F104029F515A7660DB719D55DB50
                                                    APIs
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    • GetParent.USER32(0000000F), ref: 6C759CA9
                                                    • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C759CCB
                                                    • GetWindowRect.USER32(0000000F,?), ref: 6C759CEF
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 6C759D0F
                                                    • MonitorFromWindow.USER32(00000000,00000001), ref: 6C759D48
                                                    • GetMonitorInfoW.USER32(00000000), ref: 6C759D4F
                                                    • CopyRect.USER32(?,?), ref: 6C759D5D
                                                    • GetWindowRect.USER32(00000000,?), ref: 6C759D6A
                                                    • MonitorFromWindow.USER32(00000000,00000002), ref: 6C759D77
                                                    • GetMonitorInfoW.USER32(00000000), ref: 6C759D7E
                                                    • CopyRect.USER32(?,?), ref: 6C759D8C
                                                    • GetParent.USER32(0000000F), ref: 6C759D96
                                                    • GetClientRect.USER32(00000000,?), ref: 6C759DA3
                                                    • GetClientRect.USER32(00000000,?), ref: 6C759DAE
                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6C759DBC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$Monitor$ClientCopyFromInfoLongParent$MessagePointsSend
                                                    • String ID: (
                                                    • API String ID: 3610148278-3887548279
                                                    • Opcode ID: f98d0035ba54d89f9a507200cddf2dcdfbfb5fbf7f291bdc6e9fd5e2e8f2ad2e
                                                    • Instruction ID: 3b5fc110b9a70a0511970e68d3240187294d883fe00794a2be35f8d3e8edda84
                                                    • Opcode Fuzzy Hash: f98d0035ba54d89f9a507200cddf2dcdfbfb5fbf7f291bdc6e9fd5e2e8f2ad2e
                                                    • Instruction Fuzzy Hash: E76172B1A00209AFCF01CBA8CA89EEEB7B9FF55349F650224F515E7180DB30AD56CB51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C78CC25
                                                    • IsWindow.USER32(?), ref: 6C78CCBC
                                                    • GetMenuItemCount.USER32(00000001), ref: 6C78CE61
                                                    • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 6C78CE92
                                                    • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6C78CF18
                                                    • SendMessageW.USER32(?,0000041C,00000000,?), ref: 6C78CF59
                                                    • GetMenuItemCount.USER32(00000001), ref: 6C78CFCC
                                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 6C78CFE2
                                                    • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 6C78CFFD
                                                    • GetMenuItemCount.USER32(00000001), ref: 6C78D06C
                                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 6C78D082
                                                    • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 6C78D09C
                                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 6C78CE77
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    • AppendMenuW.USER32(00000002,00000000,00000000,?), ref: 6C78D186
                                                    • GetWindow.USER32(?,00000005), ref: 6C78D1B6
                                                    • AppendMenuW.USER32(00000003,00000000,00000000,?), ref: 6C78D231
                                                    • GetMenuItemCount.USER32(?), ref: 6C78D275
                                                    • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6C78D28B
                                                    • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C78D2A2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Append$CountItem$MessageSendWindow$CtrlH_prolog3_
                                                    • String ID:
                                                    • API String ID: 465015882-0
                                                    • Opcode ID: aeeb6e280e712b95a8e7b161aa398a1ddb8f69e927339ce0da08828958fd2501
                                                    • Instruction ID: ec3e8d038f5bf7394cb81e2f1535fd7db2d41941e8d1e9220516b5058c5f66be
                                                    • Opcode Fuzzy Hash: aeeb6e280e712b95a8e7b161aa398a1ddb8f69e927339ce0da08828958fd2501
                                                    • Instruction Fuzzy Hash: 67029E30A01219DFDF25DB64CA48BADBB75BF49318F2440AAE919A7790CF30AD45CF91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C78591E
                                                    • CreateRectRgnIndirect.GDI32(?), ref: 6C785956
                                                    • CopyRect.USER32(?,?), ref: 6C78596A
                                                    • InflateRect.USER32(?,?,?), ref: 6C785980
                                                    • IntersectRect.USER32(?,?,?), ref: 6C78598C
                                                    • CreateRectRgnIndirect.GDI32(?), ref: 6C785996
                                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C7859AB
                                                    • CombineRgn.GDI32(?,?,?,00000003), ref: 6C7859C5
                                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C785A0C
                                                    • SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6C785A29
                                                    • CopyRect.USER32(?,?), ref: 6C785A34
                                                    • InflateRect.USER32(?,?,?), ref: 6C785A4A
                                                    • IntersectRect.USER32(?,?,?), ref: 6C785A56
                                                    • SetRectRgn.GDI32(?,?,?,?,?), ref: 6C785A6B
                                                    • CombineRgn.GDI32(?,?,?,00000003), ref: 6C785A7C
                                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C785A90
                                                    • CombineRgn.GDI32(?,?,?,00000003), ref: 6C785AAA
                                                      • Part of subcall function 6C785873: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C7858BA
                                                      • Part of subcall function 6C785873: CreatePatternBrush.GDI32(00000000), ref: 6C7858C7
                                                      • Part of subcall function 6C785873: DeleteObject.GDI32(00000000), ref: 6C7858D3
                                                    • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C785B08
                                                      • Part of subcall function 6C702190: SelectObject.GDI32(?,00000000), ref: 6C7021B0
                                                      • Part of subcall function 6C702190: SelectObject.GDI32(?,00000000), ref: 6C7021C6
                                                      • Part of subcall function 6C702732: SelectClipRgn.GDI32(?,00000000), ref: 6C702752
                                                      • Part of subcall function 6C702732: SelectClipRgn.GDI32(?,00000000), ref: 6C702768
                                                    • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C785B6B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Create$Select$CombineObject$ClipCopyIndirectInflateIntersect$BitmapBrushDeleteH_prolog3_Pattern
                                                    • String ID:
                                                    • API String ID: 770706554-0
                                                    • Opcode ID: 07172b91bf7791d122fd606f9f3faa7c3ac6712c13d8317caf1e0418501898cc
                                                    • Instruction ID: bdfa040cf22454a968c325111b6ba6576a1896d542ef7fc907bc8f29dd91bce8
                                                    • Opcode Fuzzy Hash: 07172b91bf7791d122fd606f9f3faa7c3ac6712c13d8317caf1e0418501898cc
                                                    • Instruction Fuzzy Hash: 559106B2A00218AFCF15DFE4D988DEEBBB9BF48344B144529F512E3650CB34A955CBA1
                                                    APIs
                                                    • InflateRect.USER32(?,00000004,00000004), ref: 6C7CBF3E
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C7CBF50
                                                    • UpdateWindow.USER32(?), ref: 6C7CBF59
                                                    • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6C7CBF9A
                                                    • DispatchMessageW.USER32(?), ref: 6C7CBFAC
                                                    • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6C7CBFBC
                                                    • GetCapture.USER32 ref: 6C7CBFC6
                                                    • SetCapture.USER32(?), ref: 6C7CBFD7
                                                    • GetCapture.USER32 ref: 6C7CBFE3
                                                    • GetWindowRect.USER32(?,?), ref: 6C7CC00B
                                                    • SetCursorPos.USER32(?,?), ref: 6C7CC032
                                                    • GetCapture.USER32 ref: 6C7CC038
                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6C7CC051
                                                    • DispatchMessageW.USER32(?), ref: 6C7CC07B
                                                    • ReleaseCapture.USER32 ref: 6C7CC0BB
                                                    • IsWindow.USER32(?), ref: 6C7CC0C4
                                                    • SendMessageW.USER32(8589084D,00000010,00000000,00000000), ref: 6C7CC0DD
                                                    • SetTimer.USER32(?,0000EC05,00000000), ref: 6C7CFCCD
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message$Capture$RectWindow$Dispatch$CursorInflateInvalidatePeekReleaseSendTimerUpdate
                                                    • String ID:
                                                    • API String ID: 3094444671-0
                                                    • Opcode ID: 42065c3ebcae165d0e3a4f4c3d8f8b25b91698a052aa65cb4d129e212ff91407
                                                    • Instruction ID: 172d07bd9871223d13114127c3476e3add712afcdba88d57a5480c49fa69b580
                                                    • Opcode Fuzzy Hash: 42065c3ebcae165d0e3a4f4c3d8f8b25b91698a052aa65cb4d129e212ff91407
                                                    • Instruction Fuzzy Hash: 61B1C071B05216AFDF14EBA5DE48EAE77B5BF45399F140139E911A7B80DB30A800CB92
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C8368E1
                                                    • GetCursorPos.USER32(?), ref: 6C83699A
                                                    • IsRectEmpty.USER32(?), ref: 6C8369CE
                                                    • IsRectEmpty.USER32(?), ref: 6C8369F5
                                                    • IsRectEmpty.USER32(?), ref: 6C836A17
                                                    • GetWindowRect.USER32(?,?), ref: 6C836A45
                                                    • GetWindowRect.USER32(?,?), ref: 6C836A75
                                                    • PtInRect.USER32(?,?,?), ref: 6C836AC2
                                                    • OffsetRect.USER32(?,?,00000000), ref: 6C836ADA
                                                      • Part of subcall function 6C70693E: __EH_prolog3.LIBCMT ref: 6C706945
                                                      • Part of subcall function 6C70693E: SetRectEmpty.USER32 ref: 6C706A45
                                                      • Part of subcall function 6C70693E: SetRectEmpty.USER32(?), ref: 6C706A4C
                                                    • SetRectEmpty.USER32(?), ref: 6C836AFD
                                                    • OffsetRect.USER32(?,?,?), ref: 6C836C8E
                                                    • IsRectEmpty.USER32(?), ref: 6C836CAE
                                                    • IsRectEmpty.USER32(?), ref: 6C836CE1
                                                    • PtInRect.USER32(?,00000000,00000000), ref: 6C836CF5
                                                    • OffsetRect.USER32(?,?,?), ref: 6C836D21
                                                    • IsRectEmpty.USER32(?), ref: 6C836D40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3_
                                                    • String ID:
                                                    • API String ID: 359163869-0
                                                    • Opcode ID: c4c2ec7016c21461a1b2f2685cc8960cfb9681a638c1ac5bebfd512345b0922d
                                                    • Instruction ID: 129d4702098755716afc9b8f7f29bd93955f62cc238f55a870e6c46b7a1e3e1c
                                                    • Opcode Fuzzy Hash: c4c2ec7016c21461a1b2f2685cc8960cfb9681a638c1ac5bebfd512345b0922d
                                                    • Instruction Fuzzy Hash: 34E1D231A00215DFCF25CFA8CA88AAEBBB5FF45308F146569E809DF645DB31E941CB90
                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,00000000,?,6C7920B8,?,00000000,00000001,00000000), ref: 6C7DB8EB
                                                      • Part of subcall function 6C7DB4EA: GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?,?,6C7DB8E9,?,00000000,?,6C7920B8,?,00000000,00000001,00000000), ref: 6C7DB4FB
                                                      • Part of subcall function 6C7DB4EA: GetProcAddress.KERNEL32(00000000,DeleteFileTransactedW), ref: 6C7DB50B
                                                    • GetLastError.KERNEL32(?,?,6C7920B8,?,00000000,00000001,00000000), ref: 6C7DB8FB
                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB932
                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB93D
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000002,?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB950
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB99A
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,00000000), ref: 6C7DB9C7
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB9D5
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,?,?,00000000,00000018), ref: 6C7DB9F4
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,?,?,?,?,?), ref: 6C7DBA25
                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 6C7DBA3F
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C7DBA5C
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C7DBA6A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$File$CurrentHandleProcess$AddressDeleteDuplicateModulePointerProcSize
                                                    • String ID:
                                                    • API String ID: 1821772631-0
                                                    • Opcode ID: 74f45518edc48bcf0352333bbefe700c43a36a3767c0ec81ed88c33049c5f785
                                                    • Instruction ID: 7b886dfccdf248f17950f8e24d6a683b2af9362a6fea1088c6e18d6e201d4093
                                                    • Opcode Fuzzy Hash: 74f45518edc48bcf0352333bbefe700c43a36a3767c0ec81ed88c33049c5f785
                                                    • Instruction Fuzzy Hash: 0661CF75A00218ABCF10EFA5D94CD9E7BB8EF452A8F118169F916D7640EB74F900DBE0
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 6C7DEC35
                                                    • SendMessageW.USER32(00000000,00000084,00000000,?), ref: 6C7DEC53
                                                    • ReleaseCapture.USER32 ref: 6C7DEC9D
                                                    • GetMessageW.USER32(?,00000000,000000A1,000000A1), ref: 6C7DECAD
                                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 6C7DECBF
                                                    • DispatchMessageW.USER32(?), ref: 6C7DECC6
                                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 6C7DECEC
                                                    • GetCapture.USER32 ref: 6C7DECFC
                                                    • ReleaseCapture.USER32 ref: 6C7DED06
                                                    • PeekMessageW.USER32(?,00000000,00000200,00000209,00000003), ref: 6C7DED1A
                                                    • PeekMessageW.USER32(?,00000000,?,?,00000000), ref: 6C7DED2F
                                                    • GetMessageW.USER32(?,00000000,?,?), ref: 6C7DED42
                                                    • TranslateMessage.USER32(?), ref: 6C7DED62
                                                    • DispatchMessageW.USER32(?), ref: 6C7DED7D
                                                    • GetCursorPos.USER32(00000000), ref: 6C7DED87
                                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 6C7DEDA8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$Capture$DispatchRelease$CursorSendTranslate
                                                    • String ID:
                                                    • API String ID: 605349011-0
                                                    • Opcode ID: 6e4f192c4e0c855265dcbb2a62b1854fe282d2736da8c8ae6b70abccac96debe
                                                    • Instruction ID: a38829ceeafd36b2a2c6747e56ca66422227201c56d3273d38be1dd7d70ccd24
                                                    • Opcode Fuzzy Hash: 6e4f192c4e0c855265dcbb2a62b1854fe282d2736da8c8ae6b70abccac96debe
                                                    • Instruction Fuzzy Hash: 2751B370700209BBEB224F24DE89F6DFA39FB46749F114139F52596AC0D774B880C6E2
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000032), ref: 6C6F5585
                                                    • GetSystemMetrics.USER32(00000031), ref: 6C6F558F
                                                    • LoadImageW.USER32(?,000000A2,00000001,00000000,00000000,00000000), ref: 6C6F55BE
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 6C6F55D4
                                                    • GetSystemMetrics.USER32(00000032), ref: 6C6F55E6
                                                    • GetSystemMetrics.USER32(00000031), ref: 6C6F55F1
                                                    • LoadImageW.USER32(?,000000A4,00000001,00000000,00000000,00000000), ref: 6C6F5615
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 6C6F562B
                                                    • GetSystemMetrics.USER32(00000032), ref: 6C6F563D
                                                    • GetSystemMetrics.USER32(00000031), ref: 6C6F5648
                                                    • LoadImageW.USER32(?,000000A6,00000001,00000000,00000000,00000000), ref: 6C6F5668
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 6C6F567C
                                                    • GetSystemMetrics.USER32(00000032), ref: 6C6F568E
                                                    • GetSystemMetrics.USER32(00000031), ref: 6C6F5698
                                                    • LoadImageW.USER32(?,?,00000001,00000000,00000000,00000000), ref: 6C6F56B7
                                                    • SendMessageW.USER32(?,00000080,00000000,?), ref: 6C6F5712
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$ImageLoadMessageSend
                                                    • String ID:
                                                    • API String ID: 530543073-0
                                                    • Opcode ID: a958ce723269557f5f00b3affdb9f4a97c9c971f0f4fe1bbda491a36328d8690
                                                    • Instruction ID: 1d1778398c71af51e86632ec90c12e830dde5f19589c74f69e68585895f011c9
                                                    • Opcode Fuzzy Hash: a958ce723269557f5f00b3affdb9f4a97c9c971f0f4fe1bbda491a36328d8690
                                                    • Instruction Fuzzy Hash: 9B416071204300AFEB65AB28DD49E2BBAEDEB89355F00853DB599C3261DB71AC14CB61
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?), ref: 6C7C2C04
                                                    • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 6C7C2C14
                                                    • EncodePointer.KERNEL32(00000000,?,?), ref: 6C7C2C1D
                                                    • DecodePointer.KERNEL32(00000000,?,?), ref: 6C7C2C2B
                                                    • GetUserDefaultUILanguage.KERNEL32(?,?), ref: 6C7C2C52
                                                    • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C7C2C62
                                                    • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C7C2C96
                                                    • GetSystemDefaultUILanguage.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C7C2CC9
                                                    • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C7C2CD9
                                                    • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C7C2D16
                                                    • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C7C2D51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DownlevelLocaleName___crt$DefaultLanguagePointer$AddressDecodeEncodeHandleModuleProcSystemUser
                                                    • String ID: GetThreadPreferredUILanguages$kernel32.dll
                                                    • API String ID: 404278886-1646127487
                                                    • Opcode ID: c9a80ad4a088fdedf5d9f5114165431838e288c526ee84129d2931d709342128
                                                    • Instruction ID: 3f154a1ab5eeecf15ecdbec6364203c22e84e1d9dc702a965c4925f3a403fb53
                                                    • Opcode Fuzzy Hash: c9a80ad4a088fdedf5d9f5114165431838e288c526ee84129d2931d709342128
                                                    • Instruction Fuzzy Hash: 59512A75A0020AAFCB14DFA8C988EEF77BDEF49305B110465E911E7650DB34EA09CBA1
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 6C722E1F
                                                    • InflateRect.USER32(?,00000000,00000000), ref: 6C722E59
                                                    • SetRectEmpty.USER32(?), ref: 6C722EFD
                                                    • SetRectEmpty.USER32(?), ref: 6C722F0A
                                                    • GetSystemMetrics.USER32(00000002), ref: 6C722F2F
                                                    • KillTimer.USER32(?,0000EC16), ref: 6C722FDF
                                                    • EqualRect.USER32(?,?), ref: 6C722FFC
                                                    • EqualRect.USER32(?,?), ref: 6C723011
                                                    • EqualRect.USER32(?,?), ref: 6C723080
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C723095
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C7230A6
                                                    • EqualRect.USER32(?,?), ref: 6C7230B9
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C7230CB
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C7230DC
                                                    • UpdateWindow.USER32(?), ref: 6C7230ED
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$EqualInvalidate$Empty$ClientInflateKillMetricsSystemTimerUpdateWindow
                                                    • String ID:
                                                    • API String ID: 2140115980-0
                                                    • Opcode ID: a3d2491247d84a102974cfe36955aaef18a1295e386090547b05637738a580c6
                                                    • Instruction ID: e62fb9baaaa3062befa326c5dbf8c88e2926f3384314ff99fd821b4f51901612
                                                    • Opcode Fuzzy Hash: a3d2491247d84a102974cfe36955aaef18a1295e386090547b05637738a580c6
                                                    • Instruction Fuzzy Hash: 62A14972A0061ADFCF10CFA4C988AEE77B9FF49344F144179ED06AB605DB34A941DBA1
                                                    APIs
                                                    • GetDlgCtrlID.USER32(?), ref: 6C763B5B
                                                    • GetDlgItem.USER32(00000000,?), ref: 6C763C18
                                                    • ShowWindow.USER32(00000000,00000000), ref: 6C763C26
                                                    • GetMenu.USER32(?), ref: 6C763C38
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 6C763C54
                                                    • GetDlgItem.USER32(?,0000E900), ref: 6C763CA0
                                                    • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C763CB4
                                                    • GetDlgItem.USER32(?,0000EA21), ref: 6C763CD0
                                                    • GetDlgItem.USER32(?,0000E900), ref: 6C763CE6
                                                    • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C763CF8
                                                    • SetWindowLongW.USER32(?,000000F4,0000E900), ref: 6C763D04
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 6C763D17
                                                    • SetMenu.USER32(?,00000000), ref: 6C763D2E
                                                    • GetDlgItem.USER32(?,?), ref: 6C763D8B
                                                    • ShowWindow.USER32(?,00000005), ref: 6C763D99
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ItemWindow$Long$InvalidateMenuRectShow$Ctrl
                                                    • String ID:
                                                    • API String ID: 599340499-0
                                                    • Opcode ID: aad8579b32ff6215598f881fd4873843e1d52ddfd501f6a7882b23c61f69d7aa
                                                    • Instruction ID: b9a371d39df3a6c5caf7eb0c9ca16b5f9021a77816381504c0788d75cad21bea
                                                    • Opcode Fuzzy Hash: aad8579b32ff6215598f881fd4873843e1d52ddfd501f6a7882b23c61f69d7aa
                                                    • Instruction Fuzzy Hash: 21918A74B00616EFDF14CF65C989BADBBB1FF09304F100169E826ABA90DB70AD50CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C7229A5
                                                    • GetClientRect.USER32(?,?), ref: 6C7229C3
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C7229FC
                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C722A51
                                                    • CreateDIBSection.GDI32(?,?), ref: 6C722AC3
                                                    • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 6C722AFC
                                                    • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 6C722B2F
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6C722B97
                                                    • GetWindowRect.USER32(?,?), ref: 6C722C06
                                                    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C722D56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Create$Section$CompatibleRect$BitmapClientH_prolog3_Window
                                                    • String ID: (
                                                    • API String ID: 2918208214-3887548279
                                                    • Opcode ID: bf156b6972d4a9079dde6ed22d78c70567eeed01e6f2ee39b41c13ece18e2df0
                                                    • Instruction ID: 581a25ef208334dac0294d072193ebb6d859b6a5723fc25be5123eca4c52c950
                                                    • Opcode Fuzzy Hash: bf156b6972d4a9079dde6ed22d78c70567eeed01e6f2ee39b41c13ece18e2df0
                                                    • Instruction Fuzzy Hash: BED11AB1A00619EFDF15CFA9CA88AEDBBB9FF08314F104129E519A7610DB34AD55CF50
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C779672
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                    • GetWindowRect.USER32(?,?), ref: 6C779758
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                      • Part of subcall function 6C77B3F1: GetWindowRect.USER32(?,?), ref: 6C77B3FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3RectWindow$Ctrl
                                                    • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                                    • API String ID: 2598721110-2628993547
                                                    • Opcode ID: 2b1a8223cc61a770d3d68e561db488743f3d2bcfd0885394bd4e0158a67418b0
                                                    • Instruction ID: d7cff16647ead765ed1bda5dbd1d641cebf43a62a2112af326b79810846042e3
                                                    • Opcode Fuzzy Hash: 2b1a8223cc61a770d3d68e561db488743f3d2bcfd0885394bd4e0158a67418b0
                                                    • Instruction Fuzzy Hash: 17813675A00209DFCF04DFA5C9989FDBBB6FF89314F190568E916AB7A1CB31A801DB50
                                                    APIs
                                                    • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6C7241E2
                                                    • DispatchMessageW.USER32(?), ref: 6C7241F0
                                                    • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6C7241FE
                                                    • GetCapture.USER32 ref: 6C724208
                                                    • SetCapture.USER32(?), ref: 6C72421C
                                                    • GetWindowRect.USER32(?,?), ref: 6C724239
                                                    • GetCapture.USER32 ref: 6C7242AC
                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6C7242C9
                                                    • DispatchMessageW.USER32(?), ref: 6C7242EF
                                                    • GetScrollPos.USER32(00000000,00000002), ref: 6C72440C
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000581), ref: 6C724429
                                                    • ReleaseCapture.USER32 ref: 6C7244CB
                                                    • IsWindow.USER32(?), ref: 6C7244D4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message$Capture$Window$Dispatch$PeekRectRedrawReleaseScroll
                                                    • String ID:
                                                    • API String ID: 1873598099-0
                                                    • Opcode ID: ac1dbe15e0095332c708cc119dd3b127bf8f6bdb6786eace040218f7d6d5a9c1
                                                    • Instruction ID: f230e8e1e957496a4c1ccd8d91743cb7144802e14c98e868f59f0ed2cf1cfa7d
                                                    • Opcode Fuzzy Hash: ac1dbe15e0095332c708cc119dd3b127bf8f6bdb6786eace040218f7d6d5a9c1
                                                    • Instruction Fuzzy Hash: 09A18B71A01214CFDF14CF65CA98BEE7BB5FF49348F144179E81AAB685CB349845CBA0
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C744DFD
                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 6C744E3B
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C744E7A
                                                    • SelectObject.GDI32(?,00000000), ref: 6C744E9D
                                                    • GetObjectW.GDI32(?,00000054,?), ref: 6C744EEA
                                                    • CreateDIBSection.GDI32(?,?), ref: 6C744F4C
                                                    • CreateCompatibleDC.GDI32(?), ref: 6C744F86
                                                    • SelectObject.GDI32(?,00000000), ref: 6C744F9F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Create$CompatibleSelect$H_prolog3_Section
                                                    • String ID:
                                                    • API String ID: 1338481308-0
                                                    • Opcode ID: 70dbeaba086ea4493c791b1d9e0b43a60f14947b4ee1263a36a3a0479362f05a
                                                    • Instruction ID: 3cac4cd99c2b8f4f6031806767b2bd02b4d87aca79c25204677c828c4743a207
                                                    • Opcode Fuzzy Hash: 70dbeaba086ea4493c791b1d9e0b43a60f14947b4ee1263a36a3a0479362f05a
                                                    • Instruction Fuzzy Hash: 0AA14775A00214DFDB61CF24DD88F9AB7B5BF09304F1080A9E85DA7651EB30AE88DF61
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C779475
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                      • Part of subcall function 6C7767F6: __EH_prolog3.LIBCMT ref: 6C7767FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$Ctrl
                                                    • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                                    • API String ID: 3879667756-2628993547
                                                    • Opcode ID: 395cbfb9aa2bd0f6d769639366610008be111244e46289b2f8460b396085f558
                                                    • Instruction ID: 5f8cd239e7f80f32c0ec60053234ddcc1bfc970e3c032aca58f773820ce08cf4
                                                    • Opcode Fuzzy Hash: 395cbfb9aa2bd0f6d769639366610008be111244e46289b2f8460b396085f558
                                                    • Instruction Fuzzy Hash: 55519F75B00119AFCF14DF60C9989EDBB76FF8A314F140569E816AB780CB31AD09CB91
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(yyzyBase.dll), ref: 6C6F995F
                                                    • LoadResource.KERNEL32(?,?), ref: 6C6F9A4E
                                                    • SizeofResource.KERNEL32(?,?), ref: 6C6F9A60
                                                    • FindResourceW.KERNEL32(?,CONFIG,AFX_DIALOG_LAYOUT), ref: 6C6F9A94
                                                    • LockResource.KERNEL32(?), ref: 6C6F9ACA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindHandleLoadLockModuleSizeof
                                                    • String ID: AFX_DIALOG_LAYOUT$CONFIG$ke*$le*$le*$yyzyBase.dll
                                                    • API String ID: 1601749889-438318081
                                                    • Opcode ID: 8bb48d31fc50eb00fc0f39047844b1ec46bed1eff74a10e53040be50d6fc6eb8
                                                    • Instruction ID: c849a98d363f9a2ee126fcb92d1e7edb561eadf2fca1cbd0054165d956381e52
                                                    • Opcode Fuzzy Hash: 8bb48d31fc50eb00fc0f39047844b1ec46bed1eff74a10e53040be50d6fc6eb8
                                                    • Instruction Fuzzy Hash: 2B418B74508200AFCB119F19D880A0EBBF2EF9A758F59492AF4A893720D331D85ACF57
                                                    APIs
                                                    • GetCapture.USER32 ref: 6C713D31
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C713D59
                                                    • IsWindow.USER32(?), ref: 6C713E37
                                                    • ClientToScreen.USER32(?,?), ref: 6C713E4F
                                                    • ClientToScreen.USER32(?,?), ref: 6C713E7D
                                                    • GetKeyState.USER32(00000011), ref: 6C713EC1
                                                    • GetKeyState.USER32(00000010), ref: 6C713ECD
                                                    • ImmGetContext.IMM32(?), ref: 6C713EDA
                                                    • ImmGetOpenStatus.IMM32(00000000,?), ref: 6C713EE9
                                                    • ImmReleaseContext.IMM32(?,00000000,?), ref: 6C713F0E
                                                    • GetFocus.USER32 ref: 6C713F40
                                                    • IsWindow.USER32(?), ref: 6C713FE8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientContextScreenStateWindow$CaptureFocusMessageOpenReleaseSendStatus
                                                    • String ID:
                                                    • API String ID: 1302178629-0
                                                    • Opcode ID: 4496621fcf74ce438fcbb9ba6f557fcdb07627689360b9f3dc54874595ed01a7
                                                    • Instruction ID: eaeb64fc54da5214364496391319195cd444b5d6ef6d6ef6b6700687a100e6c3
                                                    • Opcode Fuzzy Hash: 4496621fcf74ce438fcbb9ba6f557fcdb07627689360b9f3dc54874595ed01a7
                                                    • Instruction Fuzzy Hash: 4AA11331A08602EFCB118F7ACB09AAEBBB9FF45308F184579E56597D60DB31D548CB40
                                                    APIs
                                                      • Part of subcall function 6C7DEB3B: LoadCursorW.USER32(00000000,00007F8B), ref: 6C7DEB53
                                                      • Part of subcall function 6C7DEB3B: LoadCursorW.USER32(?,00007901), ref: 6C7DEB70
                                                    • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 6C7DE95E
                                                    • PostMessageW.USER32(?,00000111,0000E145,?), ref: 6C7DE9DA
                                                    • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 6C7DE9FF
                                                    • GetCursorPos.USER32(?), ref: 6C7DEA19
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C7DEA45
                                                    • ReleaseCapture.USER32 ref: 6C7DEA9C
                                                    • SetCapture.USER32(?), ref: 6C7DEAA5
                                                    • ReleaseCapture.USER32 ref: 6C7DEAB1
                                                    • SendMessageW.USER32(?,00000362,?,00000000), ref: 6C7DEAC3
                                                    • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 6C7DEB03
                                                    • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C7DEB30
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
                                                    • String ID:
                                                    • API String ID: 291007519-0
                                                    • Opcode ID: be8bfd849145ffd8e3a34bc15045eceb9f562805ed9ef2d9df0e6992a6300686
                                                    • Instruction ID: 1000be30828029637de63c4dc4af22a1faa09c9e117ebe4906c266b2d1a89d8d
                                                    • Opcode Fuzzy Hash: be8bfd849145ffd8e3a34bc15045eceb9f562805ed9ef2d9df0e6992a6300686
                                                    • Instruction Fuzzy Hash: 42519571A00209EFDF129F61C949EAEBB79FF85744F1100B9F916AB691C730AD00CB91
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7F6B09
                                                    • GetObjectW.GDI32(00000004,00000018,?), ref: 6C7F6B20
                                                      • Part of subcall function 6C7F6A5F: CreateDIBSection.GDI32(00000000,00000028,00000000,00000000,00000000,00000000), ref: 6C7F6AD6
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C7F6BA0
                                                    • SelectObject.GDI32(?,00000004), ref: 6C7F6BB3
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C7F6BD1
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7F6BE6
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C7F6C05
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7F6C13
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7F6C1D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$Create$Compatible$H_prolog3Section
                                                    • String ID:
                                                    • API String ID: 2431383920-3916222277
                                                    • Opcode ID: 14d552539075dc42d825be8bcf3612d754d7eef27d69fadca8cc35a44fc7ab58
                                                    • Instruction ID: da488f42937bce191766a30b64dce2e344fbe40f1a9185c0fbf2991a758ba1a1
                                                    • Opcode Fuzzy Hash: 14d552539075dc42d825be8bcf3612d754d7eef27d69fadca8cc35a44fc7ab58
                                                    • Instruction Fuzzy Hash: B3417072E001199FDB11DBE0DE98AEEBB75FF55308F104029E961A7750DB719E0ACBA0
                                                    APIs
                                                    • CoInitialize.OLE32(00000000), ref: 6C7C1C2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                                    • API String ID: 2538663250-1403614551
                                                    • Opcode ID: 88e9f3c58f6335d05615dbd29ef91a77346c4cc453fc89b34c77c2f796953fb7
                                                    • Instruction ID: 1f2e5ce53c2db514db824f462e63c4c35a51a97e0ebf6c7135168d8aaa092533
                                                    • Opcode Fuzzy Hash: 88e9f3c58f6335d05615dbd29ef91a77346c4cc453fc89b34c77c2f796953fb7
                                                    • Instruction Fuzzy Hash: EB21A175744706AFD7309F65CE48F167AB8EB4639AF104D3AF452E2E40DB30D804DA61
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C722402
                                                    • GetClientRect.USER32(?,?), ref: 6C722420
                                                    • SetRectEmpty.USER32(?), ref: 6C722474
                                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C7224BF
                                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C722548
                                                    • GetWindowRect.USER32(?,?), ref: 6C72256D
                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6C722599
                                                    • OffsetRect.USER32(?,?,00000000), ref: 6C722647
                                                    • InflateRect.USER32(?,00000000,00000000), ref: 6C7226A5
                                                    • IsRectEmpty.USER32(?), ref: 6C7227A3
                                                    • IsRectEmpty.USER32(?), ref: 6C722933
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$EmptyWindow$Points$ClientH_prolog3_InflateOffset
                                                    • String ID:
                                                    • API String ID: 302641110-0
                                                    • Opcode ID: 26ab470a59ff8af9e4af21c4256e832aadc37b02ee8d19702150675e5753ad18
                                                    • Instruction ID: eed7f4d27642e510a37e512c8c017d7251c2f1a77abf79fe90f28c80c972b2f7
                                                    • Opcode Fuzzy Hash: 26ab470a59ff8af9e4af21c4256e832aadc37b02ee8d19702150675e5753ad18
                                                    • Instruction Fuzzy Hash: 99126971E10619DFDF05CFA4CA48AEEBBB2FF49314F240169E816AB650DB75AD05CB80
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C712983
                                                    • GetParent.USER32(?), ref: 6C71298C
                                                    • IsZoomed.USER32(?), ref: 6C7129F7
                                                    • SetWindowRgn.USER32 ref: 6C712A79
                                                    • GetClientRect.USER32(?,?), ref: 6C712A9E
                                                    • GetClientRect.USER32(?,?), ref: 6C712AB2
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D78
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D85
                                                    • GetWindowRect.USER32(?,?), ref: 6C712AD1
                                                      • Part of subcall function 6C790C53: SetWindowPos.USER32(?,?,?,0000000A,0000000A,00000000,6C6D1806,?,?,6C6D1806,00000000,0000000A,0000000A,?,?,00000014), ref: 6C790C7B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientRectWindow$Screen$ParentZoomed
                                                    • String ID:
                                                    • API String ID: 2235899813-0
                                                    • Opcode ID: 1086120341d8d51f3253c5019611065567b5dd7d8aa2c0e474e78ce6c4846111
                                                    • Instruction ID: 43f46fca0a2c63f422373a2fe950df0b817a6ec841be709548938577215372af
                                                    • Opcode Fuzzy Hash: 1086120341d8d51f3253c5019611065567b5dd7d8aa2c0e474e78ce6c4846111
                                                    • Instruction Fuzzy Hash: 5AB16F71B05606AFDF08DF64CA58BEEB7B6BF49308F150128E915A7A40DB30AD51CB94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Capture$ClientRectScreen$AsyncCursorMetricsParentReleaseStateSystemWindow
                                                    • String ID:
                                                    • API String ID: 668609343-0
                                                    • Opcode ID: 3d8cd78cb0e0853cc69563c51d99f92fcc0b20608a2368cbc1f801f8a6c13d3c
                                                    • Instruction ID: c5e4915cb88f1a4661b72e63dd6e7161422261a8e11ff69fd7af66aa79878904
                                                    • Opcode Fuzzy Hash: 3d8cd78cb0e0853cc69563c51d99f92fcc0b20608a2368cbc1f801f8a6c13d3c
                                                    • Instruction Fuzzy Hash: 6D81AFB5B01209AFCF05DF64C959AEDBBB5FF4A308F14017AE916A7740DB30A845CB91
                                                    APIs
                                                      • Part of subcall function 6C7C17CE: __EH_prolog3_catch.LIBCMT ref: 6C7C17D5
                                                    • GetModuleHandleW.KERNEL32(comctl32.dll,6C859C9D,00000000,00000000,0000000F,?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000), ref: 6C859B51
                                                    • GetUserDefaultUILanguage.KERNEL32(?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000,?,0000000F), ref: 6C859B61
                                                    • FindResourceExW.KERNEL32(00000000,00000005,000003EE,0000FC11,?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000,?,0000000F), ref: 6C859B9F
                                                    • FindResourceW.KERNEL32(00000000,000003EE,00000005,?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000,?,0000000F), ref: 6C859BBE
                                                    • LoadResource.KERNEL32(00000000,00000000,?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000,?,0000000F), ref: 6C859BCA
                                                      • Part of subcall function 6C859CDB: GetDC.USER32(00000000), ref: 6C859D2E
                                                      • Part of subcall function 6C859CDB: EnumFontFamiliesExW.GDI32(00000000,?,6C859CC5,?,00000000,?,?,?,?,?,00000000,00000000), ref: 6C859D49
                                                      • Part of subcall function 6C859CDB: ReleaseDC.USER32(00000000,00000000), ref: 6C859D51
                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,6C812A48,00000000,?,6C81201E,0000001C,6C8118A5,?,6C81201E,00000000,?,0000000F), ref: 6C859BFA
                                                    • GlobalFree.KERNEL32(00000001), ref: 6C859C72
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindGlobal$AllocDefaultEnumFamiliesFontFreeH_prolog3_catchHandleLanguageLoadModuleReleaseUser
                                                    • String ID: MS UI Gothic$comctl32.dll
                                                    • API String ID: 1488066090-3248924666
                                                    • Opcode ID: 5e1c1fccf51ec276008ca3e8303d887f18f4ab107dc5fe722993db3b2cd163fe
                                                    • Instruction ID: eb46a96b544785374a7a35e6ee0f485a6ba4242d209f540b534fc5f66cdca35a
                                                    • Opcode Fuzzy Hash: 5e1c1fccf51ec276008ca3e8303d887f18f4ab107dc5fe722993db3b2cd163fe
                                                    • Instruction Fuzzy Hash: 8241E5B1600605ABE7245B24DA4CFBA33ECDF45728F114839F825C7A80DBB4DC5186A2
                                                    APIs
                                                    • GetStockObject.GDI32(00000011), ref: 6C7C657F
                                                    • GetStockObject.GDI32(0000000D), ref: 6C7C658B
                                                    • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C7C659C
                                                    • GetDC.USER32(00000000), ref: 6C7C65AB
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C7C65C2
                                                    • MulDiv.KERNEL32(?,00000048,00000000), ref: 6C7C65CE
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 6C7C65DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Stock$CapsDeviceRelease
                                                    • String ID: System$nwl
                                                    • API String ID: 46613423-15949819
                                                    • Opcode ID: acc532eb459be27d30c2aa19727175a3c4c8e2e83306ef03167a5033c55367e9
                                                    • Instruction ID: 45060ad4af982f9e42b6c6c726d490d9fad28f504c490e657174ae005a03de3f
                                                    • Opcode Fuzzy Hash: acc532eb459be27d30c2aa19727175a3c4c8e2e83306ef03167a5033c55367e9
                                                    • Instruction Fuzzy Hash: 8C116D71700309ABEF209A65ED89FBE7BB8AB55749F100129E605DB280DB60DD04C662
                                                    APIs
                                                      • Part of subcall function 6C7597FD: __EH_prolog3_catch.LIBCMT ref: 6C759804
                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 6C7E87F4
                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 6C7E8829
                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 6C7E8854
                                                    • LoadIconW.USER32(?,00000000), ref: 6C7E8889
                                                    • LoadIconW.USER32(00000000,00007F00), ref: 6C7E889C
                                                    • GetClassLongW.USER32(?,000000F2), ref: 6C7E88CB
                                                    • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6C7E8954
                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 6C7E8916
                                                      • Part of subcall function 6C7E77C7: __EH_prolog3_catch.LIBCMT ref: 6C7E77D1
                                                      • Part of subcall function 6C7E77C7: CloseHandle.KERNEL32(?,?,?,00000080,6C71D6B6,?,?,00000000), ref: 6C7E780C
                                                      • Part of subcall function 6C7E77C7: GetTempPathW.KERNEL32(00000104,00000000,00000104,?,?,00000080,6C71D6B6,?,?,00000000), ref: 6C7E782D
                                                      • Part of subcall function 6C7E77C7: CreateFileW.KERNEL32(000000FF,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF), ref: 6C7E7882
                                                    • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C7E8A0B
                                                    • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 6C7E8A25
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$H_prolog3_catchIconLoad$ClassCloseCreateFileHandleLongPathTemp
                                                    • String ID:
                                                    • API String ID: 2083023585-0
                                                    • Opcode ID: 0fee501401f2f57787223c4608c544d1cb3a158f2807ada822cbc9d56332715e
                                                    • Instruction ID: 05af2740b9bdd138c4a7df8f00d855e5fbecce38408a697b08d1967ad998f479
                                                    • Opcode Fuzzy Hash: 0fee501401f2f57787223c4608c544d1cb3a158f2807ada822cbc9d56332715e
                                                    • Instruction Fuzzy Hash: B4719B31701610AFDF259F25CD89BAA3B75AF49765F1400BAED19AB7D1CB30A800CFA0
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C745C34
                                                    • GetObjectW.GDI32(00000004,00000018,?), ref: 6C745C59
                                                    • GetObjectW.GDI32(00000004,00000054,?), ref: 6C745C9E
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C745D8A
                                                    • SelectObject.GDI32(?,00000004), ref: 6C745DAC
                                                    • GetPixel.GDI32(?,00000000,00000000), ref: 6C745E0B
                                                    • GetPixel.GDI32(?,?,00000000), ref: 6C745E1D
                                                    • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 6C745E2C
                                                    • SetPixel.GDI32(?,?,00000000,00000000), ref: 6C745E3E
                                                    • SelectObject.GDI32(?,00000000), ref: 6C745E8C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                                                    • String ID:
                                                    • API String ID: 1266819874-0
                                                    • Opcode ID: 666b974efedb4bde3c942985c055cbf56f8a634139cac00a337df466367f0fd2
                                                    • Instruction ID: 5f7a1576cef0979965aa7c9ea5078c076b61b2101667ff8e4d0b90a9a22fdca6
                                                    • Opcode Fuzzy Hash: 666b974efedb4bde3c942985c055cbf56f8a634139cac00a337df466367f0fd2
                                                    • Instruction Fuzzy Hash: FF812A75E002298BDF60CFA9D984A9EBBB5FF49304F248169E958EB701DB309D45CF50
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C705824
                                                    • FindResourceW.KERNEL32(?,00000000,00000005,00000024,6C713901,?,?,00000170,?,00000004,6C6F3E64,?,?,00000000,00000000,0000007E), ref: 6C705865
                                                    • LoadResource.KERNEL32(?,00000000,?,?,00000170,?,00000004,6C6F3E64,?,?,00000000,00000000,0000007E,?,00000001,0000007D), ref: 6C705871
                                                    • LockResource.KERNEL32(0000E806,00000024,6C713901,?,?,00000170,?,00000004,6C6F3E64,?,?,00000000,00000000,0000007E,?,00000001), ref: 6C705881
                                                    • GetDesktopWindow.USER32 ref: 6C7058B8
                                                    • IsWindowEnabled.USER32(00000000), ref: 6C7058C3
                                                    • EnableWindow.USER32(00000000,00000000), ref: 6C7058CF
                                                    • EnableWindow.USER32(00000000,00000001), ref: 6C7059B3
                                                    • GetActiveWindow.USER32 ref: 6C7059BD
                                                    • SetActiveWindow.USER32(00000000,?,00000024,6C713901,?,?,00000170,?,00000004,6C6F3E64,?,?,00000000,00000000,0000007E,?), ref: 6C7059C9
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindH_prolog3_catchLoadLock
                                                    • String ID:
                                                    • API String ID: 723642982-0
                                                    • Opcode ID: bf2902923f0999369259dc00deb757fc9867179119651c83a138811d2648dfa8
                                                    • Instruction ID: 97fb788afa4769b19a60480935fa1eb36f06a15864f2df73425b87c612aec828
                                                    • Opcode Fuzzy Hash: bf2902923f0999369259dc00deb757fc9867179119651c83a138811d2648dfa8
                                                    • Instruction Fuzzy Hash: B45190B0B11716DBDF509FA1DA8CBADBBB4BF08369F104129E815A7780DB349804CBA5
                                                    APIs
                                                    • GetCapture.USER32 ref: 6C7DEDD2
                                                    • WindowFromPoint.USER32(?,00000000), ref: 6C7DEDE0
                                                    • GetActiveWindow.USER32 ref: 6C7DEE01
                                                    • GetCurrentThreadId.KERNEL32 ref: 6C7DEE1B
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 6C7DEE2B
                                                    • GetDesktopWindow.USER32 ref: 6C7DEE40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Thread$ActiveCaptureCurrentDesktopFromPointProcess
                                                    • String ID:
                                                    • API String ID: 1298419125-0
                                                    • Opcode ID: 2b19690567d8e49a830972a29c2889d787c3c2ddd2cc14b9c9a6a8ec8fd9750c
                                                    • Instruction ID: 3196cd455550f9034f17cd4003fedfc1c4c61e0facda9d8ef644515cf92071ee
                                                    • Opcode Fuzzy Hash: 2b19690567d8e49a830972a29c2889d787c3c2ddd2cc14b9c9a6a8ec8fd9750c
                                                    • Instruction Fuzzy Hash: 98317031A0112AEBEF169FB4CA48A5EFBB8BF45349F124579E411A3A40DB30E940CBD1
                                                    APIs
                                                    • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C7042E1
                                                    • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C70432B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$RestartByRestartManager
                                                    • API String ID: 410705778-5890034
                                                    • Opcode ID: d89e0bffc15dba713e352c6e378da9d19d5bf923442773f62d3075626769ec71
                                                    • Instruction ID: 2c7a9fb15c2097b07cde6cad2a808da66ecf38acd8668573f4d9029331a6861f
                                                    • Opcode Fuzzy Hash: d89e0bffc15dba713e352c6e378da9d19d5bf923442773f62d3075626769ec71
                                                    • Instruction Fuzzy Hash: 26B191B1A00109AFCF05DBA4C958EFEBBB9FF49214F144069F912A7790DB35AD05DBA0
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 6C76A10E
                                                    • IsWindowVisible.USER32(?), ref: 6C76A121
                                                    • GetWindowRect.USER32(?,?), ref: 6C76A182
                                                    • IsZoomed.USER32(?), ref: 6C76A191
                                                    • SetWindowRgn.USER32(?,00000000,00000001), ref: 6C76A203
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76A285
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Visible$MetricsRectSystemZoomed
                                                    • String ID: *;ol$*;ol
                                                    • API String ID: 3738653960-1579693665
                                                    • Opcode ID: b230c0c83b1a7b3d413c5e2c61ee2dd0c911303654345631debf71ddd62f9a2c
                                                    • Instruction ID: 7c7b47ff62df18fe82f2f075363147a8905b897dd99a091feab6e9040f180616
                                                    • Opcode Fuzzy Hash: b230c0c83b1a7b3d413c5e2c61ee2dd0c911303654345631debf71ddd62f9a2c
                                                    • Instruction Fuzzy Hash: 2EA13071E00619EFDB08CFAACA44BAEB7B5FF48314F144129E815A7A40DB70A951CF91
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7E0622
                                                    • GetSystemMenu.USER32(?,00000000), ref: 6C7E06D3
                                                    • IsMenu.USER32(?), ref: 6C7E06E9
                                                    • IsMenu.USER32(?), ref: 6C7E06FD
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 6C7E0722
                                                    • GetMenuItemInfoW.USER32(00000000,0000F060,00000000,00000030), ref: 6C7E0824
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 6C7E0887
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Window$H_prolog3InfoItemLongRedrawSystem
                                                    • String ID: 0
                                                    • API String ID: 2328916801-4108050209
                                                    • Opcode ID: 5936188033abf71f6246483d405579bcf1e4c5149ac86d6d06b703b8c22eb779
                                                    • Instruction ID: 5d37ada5d838ac9f9a164d6df8608188974567b382bd869f592ed2e072d930d6
                                                    • Opcode Fuzzy Hash: 5936188033abf71f6246483d405579bcf1e4c5149ac86d6d06b703b8c22eb779
                                                    • Instruction Fuzzy Hash: 68717E71701706AFEB54DFB5CA88BAEB7B4BF08358F200229E525A76D0DB70A904DF51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C77DA1F
                                                    • GetModuleFileNameW.KERNEL32(?,00000000,00000104,00000104,0000002C,6C6FC303,?,6C8AB87C,00000000,00000000,00000001,?,?,?,?), ref: 6C77DA57
                                                    • LoadTypeLib.OLEAUT32(?,?), ref: 6C77DAC9
                                                    • GetModuleHandleW.KERNEL32(OLEAUT32.DLL,?,?,?,?,?,?,?,?), ref: 6C77DB51
                                                    • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 6C77DB61
                                                    • RegisterTypeLib.OLEAUT32 ref: 6C77DB84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ModuleType$AddressFileH_prolog3_HandleLoadNameProcRegister
                                                    • String ID: OLEAUT32.DLL$RegisterTypeLibForUser
                                                    • API String ID: 866051225-2666564778
                                                    • Opcode ID: 6cf4fd11d995975d22d1ba7a6181967b2afa6740d75b9432ade05171edae955b
                                                    • Instruction ID: d600b1f7af6e7f5bb784f3c65a4850ac2792da188c537516a917b93bfed2f732
                                                    • Opcode Fuzzy Hash: 6cf4fd11d995975d22d1ba7a6181967b2afa6740d75b9432ade05171edae955b
                                                    • Instruction Fuzzy Hash: B7515E71A00109AFCF11DFA4CA88DDD7BB5BF19758F140168E811BB790DB71AD08CB64
                                                    APIs
                                                    • GetParent.USER32(?), ref: 6C759E80
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C759EA2
                                                    • UpdateWindow.USER32(?), ref: 6C759EBC
                                                    • SendMessageW.USER32(00000170,00000121,00000001,?), ref: 6C759EE2
                                                    • SendMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C759EFA
                                                    • UpdateWindow.USER32(?), ref: 6C759F47
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C759F91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message$Window$PeekSendUpdate$LongParent
                                                    • String ID: d>ol
                                                    • API String ID: 2853195852-496250313
                                                    • Opcode ID: c342157bdb371f06e572b72b85ddf1bf5e74a93277c31569f0a10095fbba8ce0
                                                    • Instruction ID: ac813c0fd0dbfade179acbe1d60ce75365a07aa7f1b83892c98b386fd0017651
                                                    • Opcode Fuzzy Hash: c342157bdb371f06e572b72b85ddf1bf5e74a93277c31569f0a10095fbba8ce0
                                                    • Instruction Fuzzy Hash: 5641C0B1B01208BBEB148F75CA48BAEBBB8FF15349F504128E811E7A80DB74DD11CB90
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C7E048C
                                                      • Part of subcall function 6C7E161A: GetParent.USER32(?), ref: 6C7E1623
                                                      • Part of subcall function 6C7E161A: GetSystemMenu.USER32(?,00000000,?,?,00000000,?,?,6C7E04AF,?,?,?,?,?,6C713D7E,?,?), ref: 6C7E1649
                                                      • Part of subcall function 6C7E161A: SetMenuDefaultItem.USER32(?,0000F060,00000000,00000000,?,?,6C7E04AF,?,?,?,?,?,6C713D7E,?,?,?), ref: 6C7E1671
                                                      • Part of subcall function 6C7E161A: GetParent.USER32(00000000), ref: 6C7E167A
                                                      • Part of subcall function 6C7E161A: IsZoomed.USER32(?), ref: 6C7E1689
                                                      • Part of subcall function 6C7E161A: EnableMenuItem.USER32(?,0000F000,00000003), ref: 6C7E169D
                                                      • Part of subcall function 6C7E161A: EnableMenuItem.USER32(?,0000F010,00000003), ref: 6C7E16AD
                                                      • Part of subcall function 6C7E161A: EnableMenuItem.USER32(?,0000F030,00000003), ref: 6C7E16BE
                                                      • Part of subcall function 6C7E161A: EnableMenuItem.USER32(?,0000F030,00000000), ref: 6C7E1703
                                                      • Part of subcall function 6C7E161A: GetParent.USER32(00000000), ref: 6C7E170C
                                                      • Part of subcall function 6C7E161A: DeleteMenu.USER32(?,0000F120,00000000,00000000,?,?,6C7E04AF,?,?,?,?,?,6C713D7E,?,?,?), ref: 6C7E1730
                                                      • Part of subcall function 6C7E161A: DeleteMenu.USER32(?,0000F030,00000000,?,?,6C7E04AF,?,?,?,?,?,6C713D7E,?,?,?), ref: 6C7E173C
                                                      • Part of subcall function 6C7E161A: GetParent.USER32(00000000), ref: 6C7E1745
                                                      • Part of subcall function 6C7E161A: DeleteMenu.USER32(?,0000F020,00000000,00000000,?,?,6C7E04AF,?,?,?,?,?,6C713D7E,?,?,?), ref: 6C7E1769
                                                      • Part of subcall function 6C7E161A: GetParent.USER32(00000000), ref: 6C7E1780
                                                      • Part of subcall function 6C7E1B39: __EH_prolog3.LIBCMT ref: 6C7E1B40
                                                    • KillTimer.USER32(?,0000EC1A,?,?,?,?,?,6C713D7E,?,?,?), ref: 6C7E04BE
                                                    • GetFocus.USER32 ref: 6C7E054D
                                                    • SetTimer.USER32(?,0000EC1A,000000C8,00000000), ref: 6C7E0594
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$ItemParent$Enable$Delete$Timer$DefaultFocusH_prolog3KillRectSystemWindowZoomed
                                                    • String ID: ~=ql
                                                    • API String ID: 2532734362-4097252276
                                                    • Opcode ID: a85645c16e3fd6ed3308ccf38cc5c56b7156bb6ed307f9fb7bbc8d19b69d2a87
                                                    • Instruction ID: cbd845a072cd4be9fc62e34cb1b04c7cddef96228b1ea7c866ab5da9cbd5c9de
                                                    • Opcode Fuzzy Hash: a85645c16e3fd6ed3308ccf38cc5c56b7156bb6ed307f9fb7bbc8d19b69d2a87
                                                    • Instruction Fuzzy Hash: 6931E673B04648DBDF208F69CA99E9E76B1BF0E30CF140639E452A3950DF309980EA91
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(6C914D14,?,00000000,?,6C739AAF,00000001,?,?,?,6C71F462,00000000,?,00000000,?,00000000,?), ref: 6C7F27C0
                                                    • SetThreadPriority.KERNEL32(00000000,000000FF,?,00000000), ref: 6C7F27F1
                                                    • LeaveCriticalSection.KERNEL32(6C914D14,?,00000000), ref: 6C7F2807
                                                    • PlaySoundW.WINMM(MenuCommand,00000000,00012002), ref: 6C7F2858
                                                    • Sleep.KERNEL32(00000005,00000000,6C914D14,00000000,?,00000000,?,6C739AAF,00000001,?,?,?,6C71F462,00000000,?,00000000), ref: 6C7F2883
                                                    • PlaySoundW.WINMM(00000000,00000000,00000040), ref: 6C7F2898
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalPlaySectionSound$EnterLeavePrioritySleepThread
                                                    • String ID: MenuCommand$MenuPopup
                                                    • API String ID: 2370138168-2036262055
                                                    • Opcode ID: 88bb11694a5e258cdd8cf2e8fc8793687f32ed73daf94a3eff74c7fcfbd48114
                                                    • Instruction ID: ef81824c9cd1fe476ab21afc2cbe36bf25c443c787189880e34f4043d8601d8a
                                                    • Opcode Fuzzy Hash: 88bb11694a5e258cdd8cf2e8fc8793687f32ed73daf94a3eff74c7fcfbd48114
                                                    • Instruction Fuzzy Hash: 5331B6316481499BDB205A7A8A8DB593AB4F74777DF340339E93492FD0D774D842CAA0
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,00000001), ref: 6C758A14
                                                    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C758A24
                                                    • EncodePointer.KERNEL32(00000000), ref: 6C758A2D
                                                    • DecodePointer.KERNEL32(00000000,00000000,00000001), ref: 6C758A3B
                                                    • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 6C758A63
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeDirectoryEncodeHandleModuleProcSystem
                                                    • String ID: SetDefaultDllDirectories$\$kernel32.dll
                                                    • API String ID: 2101061299-3881611067
                                                    • Opcode ID: ed40a1b3df4f4deb61bb7c13d8dde2bf79e35a610e39541091e5499df3569cd5
                                                    • Instruction ID: 82416fa15dc267715d8f92e0285bf44ea8b5c1d54a00ecbda4f824a093104c0f
                                                    • Opcode Fuzzy Hash: ed40a1b3df4f4deb61bb7c13d8dde2bf79e35a610e39541091e5499df3569cd5
                                                    • Instruction Fuzzy Hash: 0721D735B81318ABCB20DA698E0DFDA37BC7B05799F540876E814D3A40EF74D958CBA0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C835C5F
                                                      • Part of subcall function 6C82E632: EnterCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E663
                                                      • Part of subcall function 6C82E632: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E679
                                                      • Part of subcall function 6C82E632: LeaveCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E687
                                                      • Part of subcall function 6C82E632: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E694
                                                    • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 6C835CAA
                                                    • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 6C835CBD
                                                    • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 6C835CD0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                                                    • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$windows
                                                    • API String ID: 4229786687-1024936294
                                                    • Opcode ID: bf3e6630241d4c080194a40ec76c6d9738df7fa17c3cc11f5616a31f4af29f3d
                                                    • Instruction ID: d893501e57a63fcc819e80b36ba8c8da330fc681048c5f230373f66849703690
                                                    • Opcode Fuzzy Hash: bf3e6630241d4c080194a40ec76c6d9738df7fa17c3cc11f5616a31f4af29f3d
                                                    • Instruction Fuzzy Hash: 62015EB0701740DFCB70DFA58A4EB297AF4BB06749F510829E249A7F80D7B48544CB86
                                                    APIs
                                                      • Part of subcall function 6C780D80: GetParent.USER32(?), ref: 6C780D83
                                                      • Part of subcall function 6C780D80: GetParent.USER32(00000000), ref: 6C780D8A
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    • GetParent.USER32(?), ref: 6C711E1B
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C711E30
                                                    • GetClientRect.USER32(?,?), ref: 6C711E91
                                                    • GetClientRect.USER32(?,?), ref: 6C711EA5
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D78
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D85
                                                    • GetWindowRect.USER32(?,?), ref: 6C711EC4
                                                      • Part of subcall function 6C790C53: SetWindowPos.USER32(?,?,?,0000000A,0000000A,00000000,6C6D1806,?,?,6C6D1806,00000000,0000000A,0000000A,?,?,00000014), ref: 6C790C7B
                                                    • GetParent.USER32(?), ref: 6C711F1B
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C711F30
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C711F79
                                                    • PostMessageW.USER32(?,00000000,00000000), ref: 6C711FAA
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientMessageParent$RectSendWindow$Screen$LongPost
                                                    • String ID:
                                                    • API String ID: 3884207962-0
                                                    • Opcode ID: 1d8ed7de53d77141ff592791692f7b5d39b91db9d7deb7b237a767255aa55d1a
                                                    • Instruction ID: 990c32f5e7f5a4c5e3486ef1543bb62864bf6a31294796b782985aeb0c5a56b9
                                                    • Opcode Fuzzy Hash: 1d8ed7de53d77141ff592791692f7b5d39b91db9d7deb7b237a767255aa55d1a
                                                    • Instruction Fuzzy Hash: BE616D71E01209AFCF14CF68DA48BEEBBB5FF49304F140229F519A7690DB30A951CB95
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7123A8
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C7123E1
                                                    • GetParent.USER32(?), ref: 6C71240E
                                                    • SetParent.USER32(?,00000000), ref: 6C712463
                                                    • GetTopWindow.USER32(?), ref: 6C7124F2
                                                    • GetWindow.USER32(?,00000002), ref: 6C71250A
                                                    • IsWindow.USER32(?), ref: 6C712529
                                                    • GetParent.USER32(?), ref: 6C712534
                                                    • DestroyWindow.USER32(?,?,00000001,00000028), ref: 6C712540
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Parent$DestroyH_prolog3MessageSend
                                                    • String ID:
                                                    • API String ID: 3234442123-0
                                                    • Opcode ID: 906e0432bed019737dd5bd2535dcaac11e59d4633daef460dbc0a1fd0585eb3a
                                                    • Instruction ID: 74e1cea4716c4cdbc89f5efbb8ebc19b6ff2978d35ca7ef685fd066d8496e773
                                                    • Opcode Fuzzy Hash: 906e0432bed019737dd5bd2535dcaac11e59d4633daef460dbc0a1fd0585eb3a
                                                    • Instruction Fuzzy Hash: A851AEB0705602AFDB059FA1CA9CFADB775BF49309F180168E9259BA91DF30EC14CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C75D422
                                                    • SendMessageW.USER32(0000BC2B,00000000,00000000,00000080), ref: 6C75D469
                                                    • SendMessageW.USER32(0000BC2B,00000000,00000000,0000BC2B), ref: 6C75D495
                                                    • ValidateRect.USER32(0000BC2B,00000000), ref: 6C75D4A8
                                                      • Part of subcall function 6C7C198A: GetClientRect.USER32(?,0000BC2B), ref: 6C7C19EE
                                                    • GetClientRect.USER32(0000BC2B,?), ref: 6C75D519
                                                    • BeginPaint.USER32(0000BC2B,?), ref: 6C75D526
                                                    • SendMessageW.USER32(0000BC2B,00000000,00000000,?), ref: 6C75D55C
                                                    • SendMessageW.USER32(0000BC2B,00000000,00000000), ref: 6C75D57E
                                                    • EndPaint.USER32(0000BC2B,?), ref: 6C75D596
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Rect$ClientPaint$BeginH_prolog3_Validate
                                                    • String ID:
                                                    • API String ID: 3883544035-0
                                                    • Opcode ID: 6de9f203f2a7fbb5755cc41fa4ea774bf10273e162428dce0c1c5636721e60ae
                                                    • Instruction ID: 6829bbd5bfabc6a19cf3dede3883cfd6ee84b73ef7a472fea708627472ccfb57
                                                    • Opcode Fuzzy Hash: 6de9f203f2a7fbb5755cc41fa4ea774bf10273e162428dce0c1c5636721e60ae
                                                    • Instruction Fuzzy Hash: ED419171B00606DFDF219F60CA88EAEBAB5BF99309F50413DE45693A60DF309914CF51
                                                    APIs
                                                      • Part of subcall function 6C7426DF: GdipGetImagePixelFormat.GDIPLUS(?,6C911F5C,00000000,00000000,?,6C742887,3F4930F2,00000000,00000000,6C911F5C), ref: 6C7426ED
                                                      • Part of subcall function 6C742723: GdipGetImagePalette.GDIPLUS(?,00000000,00000000,?,?,6C7429A6,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,3F4930F2), ref: 6C742732
                                                    • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,00000000,00000000,00000000,?,00000000,00000000,00000000,3F4930F2,00000000,00000000,6C911F5C), ref: 6C742A9B
                                                    • GdipBitmapUnlockBits.GDIPLUS(?,00000000,?,?,00000001,?,00000000,00000000,00000000,?,00000000,00000000,00000000,3F4930F2,00000000,00000000), ref: 6C742B4B
                                                    • GdipDrawImageI.GDIPLUS(?,00000000,00000000,00000000,?,?,00000082,?,00022009,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6C742B9D
                                                    • GdipDeleteGraphics.GDIPLUS(?,?,00000000,00000000,00000000,?,?,00000082,?,00022009,?,00000000,00000000,?,00000000,00000000), ref: 6C742BA8
                                                    • GdipDisposeImage.GDIPLUS(?,?,?,00000000,00000000,00000000,?,?,00000082,?,00022009,?,00000000,00000000,?,00000000), ref: 6C742BB3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Gdip$Image$BitmapBits$DeleteDisposeDrawFormatGraphicsLockPalettePixelUnlock
                                                    • String ID: &$ &
                                                    • API String ID: 1665940520-360661826
                                                    • Opcode ID: 7a0a5ed0796cd7b069d20eb1caf9fe8b3020ed424b74111fc929d2a4bd7880ec
                                                    • Instruction ID: 9602b86373a61b8aaa158cdbf190a573c2d1c249b668ecde661627c8ad7e20d9
                                                    • Opcode Fuzzy Hash: 7a0a5ed0796cd7b069d20eb1caf9fe8b3020ed424b74111fc929d2a4bd7880ec
                                                    • Instruction Fuzzy Hash: 47A16FB1A001299BCB248F14CE84BEDB7B9FF44318F5585E9EA08A7741D7309E95CF98
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C7389E0
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                    • IsWindow.USER32(?), ref: 6C738B13
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CtrlH_prolog3H_prolog3_catchWindow
                                                    • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars$Name
                                                    • API String ID: 1537839037-190999575
                                                    • Opcode ID: e282d2d0935419f0585a4eb844e2c7eef5810545b6c2f36900ecc5f7abb84561
                                                    • Instruction ID: 67945a7a75636ed157d8257e361ff681676de34b65e94a39e2376e2cea2156eb
                                                    • Opcode Fuzzy Hash: e282d2d0935419f0585a4eb844e2c7eef5810545b6c2f36900ecc5f7abb84561
                                                    • Instruction Fuzzy Hash: AE717D71E00219DFCF05DBA4CA58AEDBBB5AF49318F14419AE815B7791DB309E04CB61
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C709B02
                                                    • GetAsyncKeyState.USER32(00000011), ref: 6C709C7A
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C709CB4
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C709DA5
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000181), ref: 6C709DEB
                                                    • GetWindowRect.USER32(?,?), ref: 6C709EB7
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DB7
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DC4
                                                    • OffsetRect.USER32(?,?,?), ref: 6C709ED2
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D78
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D85
                                                      • Part of subcall function 6C790927: GetWindowLongW.USER32(?,000000EC), ref: 6C790934
                                                    • IsWindow.USER32(?), ref: 6C709F24
                                                      • Part of subcall function 6C77AE21: ReleaseCapture.USER32 ref: 6C77AE5B
                                                      • Part of subcall function 6C77AE21: IsWindow.USER32(?), ref: 6C77AE7C
                                                      • Part of subcall function 6C77AE21: DestroyWindow.USER32(?), ref: 6C77AE8C
                                                      • Part of subcall function 6C77AE21: GetParent.USER32(?), ref: 6C77AEB2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientScreen$MessageRectSend$AsyncCaptureDestroyH_prolog3_LongOffsetParentRedrawReleaseState
                                                    • String ID:
                                                    • API String ID: 1853747204-0
                                                    • Opcode ID: b36dc8fe3537acd1dc1b880ef809f0a2cb816a1ead31a52bedf71ab005a030b3
                                                    • Instruction ID: 7310f93008f08231095b5514673c5cb137bf82c02520052c718833ed0083cf16
                                                    • Opcode Fuzzy Hash: b36dc8fe3537acd1dc1b880ef809f0a2cb816a1ead31a52bedf71ab005a030b3
                                                    • Instruction Fuzzy Hash: CED19C75B012149FCF05DB64CA99BAD7BB6BF89358F250079E816AB790CF30AC01CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71D9F9
                                                    • GetSystemMenu.USER32(?,00000000,00000218,6C7149A2,00000000,00000000,00000001,?), ref: 6C71DA62
                                                    • IsMenu.USER32(?), ref: 6C71DA7B
                                                    • IsMenu.USER32(?), ref: 6C71DA95
                                                    • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 6C71DACA
                                                    • GetClassLongW.USER32(?,000000DE), ref: 6C71DAE1
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 6C71DB34
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Long$ClassH_prolog3_MessageSendSystemWindow
                                                    • String ID:
                                                    • API String ID: 859179710-0
                                                    • Opcode ID: 8db179a33c1bba45ba2c5cfe81bdbba50a907a7247a8abd1eebbbeb428d5ec7c
                                                    • Instruction ID: a6acd5e91ac50b9201f3bf7743dc24bc3108dc033142d3a32c94bf2516fb26f4
                                                    • Opcode Fuzzy Hash: 8db179a33c1bba45ba2c5cfe81bdbba50a907a7247a8abd1eebbbeb428d5ec7c
                                                    • Instruction Fuzzy Hash: E6A18370A04616DFDB15CF64CA88BADB7B4FF08318F14427AE82997A90DB306E45CF90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
                                                    • String ID:
                                                    • API String ID: 3509494761-0
                                                    • Opcode ID: e3d84541eb2566b830a270f7ed79810fee99e665a979b93527eb18aedcc6f591
                                                    • Instruction ID: 25629cf999be65ff84cda9ba7d53879ed22e7347bac580c144b7142867f1ee5e
                                                    • Opcode Fuzzy Hash: e3d84541eb2566b830a270f7ed79810fee99e665a979b93527eb18aedcc6f591
                                                    • Instruction Fuzzy Hash: 88518D717002199FEF219F24C99DBAA3BB5AF05749F1400B8EC169F691CB74ED09CBA1
                                                    APIs
                                                    • GetClientRect.USER32(?,0000E900), ref: 6C759A26
                                                    • BeginDeferWindowPos.USER32(00000008), ref: 6C759A3C
                                                    • GetTopWindow.USER32(?), ref: 6C759A4D
                                                    • GetDlgCtrlID.USER32(00000000), ref: 6C759A56
                                                    • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 6C759A8E
                                                    • GetWindow.USER32(00000000,00000002), ref: 6C759A97
                                                    • CopyRect.USER32(?,0000E900), ref: 6C759AB2
                                                    • EndDeferWindowPos.USER32(00000000), ref: 6C759B42
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                                    • String ID:
                                                    • API String ID: 1228040700-0
                                                    • Opcode ID: 88f8aac6ec65d687706b542771b9140e7741ed127298f095073a269325394c45
                                                    • Instruction ID: fdd456f5eaa2269e1c402fab775553470ee754dd07a0359f2c37625ee2898345
                                                    • Opcode Fuzzy Hash: 88f8aac6ec65d687706b542771b9140e7741ed127298f095073a269325394c45
                                                    • Instruction Fuzzy Hash: 035177B5E00218DFDF00DFA8C984BDEB7B5BF19315F54806AE815BB640CB34A951CBA0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C74385F
                                                    • EnterCriticalSection.KERNEL32(6C911F5C,00000018,6C6D67BA,?,00000000,00000000,00000000), ref: 6C74387D
                                                    • SelectObject.GDI32(?,00000018), ref: 6C7438CA
                                                    • LeaveCriticalSection.KERNEL32(6C911F5C,?), ref: 6C7438E7
                                                    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C74390F
                                                    • SelectObject.GDI32(00000000), ref: 6C74391E
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C7439A6
                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C7439C6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Create$BitmapCompatibleCriticalObjectSectionSelect$EnterH_prolog3Leave
                                                    • String ID:
                                                    • API String ID: 4255533662-0
                                                    • Opcode ID: 37ce195176379a4332dcdc8f8775c64371a5ce803501973001e21d80f90336d3
                                                    • Instruction ID: 8fd8be07c3d99e830ac1c3d0a3401df895f44ac21bb24781313c6efbab73a6bf
                                                    • Opcode Fuzzy Hash: 37ce195176379a4332dcdc8f8775c64371a5ce803501973001e21d80f90336d3
                                                    • Instruction Fuzzy Hash: 0D515C70600705EFDB21CF25CA49A96BBF4FF45749B108A3DE4AA87A50E771E808CB61
                                                    APIs
                                                      • Part of subcall function 6C77B253: ReleaseCapture.USER32 ref: 6C77B28A
                                                      • Part of subcall function 6C77B253: IsWindow.USER32(?), ref: 6C77B2B9
                                                      • Part of subcall function 6C77B253: DestroyWindow.USER32(?), ref: 6C77B2C9
                                                    • SetRectEmpty.USER32(?), ref: 6C73F975
                                                    • ReleaseCapture.USER32 ref: 6C73F97B
                                                    • SetCapture.USER32(?,?,?,?,6C73757B,?,00000000,?,?,6C7151B2,00000000,?,?,6C714068), ref: 6C73F98E
                                                    • GetCapture.USER32 ref: 6C73F9CD
                                                    • ReleaseCapture.USER32 ref: 6C73F9DD
                                                    • SetCapture.USER32(?,?,?,?,6C73757B,?,00000000,?,?,6C7151B2,00000000,?,?,6C714068), ref: 6C73F9F0
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6C73FA8E
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6C73FADB
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Capture$Window$Release$Redraw$DestroyEmptyRect
                                                    • String ID:
                                                    • API String ID: 2209428161-0
                                                    • Opcode ID: 396d444ffb7aed0f03770bd93ff4612a2645614bf9d7b64558f549f33e5c519f
                                                    • Instruction ID: a6476308f6f3ca62459a06d82d2262c5d1a3e92f91b702535e768924a27608dc
                                                    • Opcode Fuzzy Hash: 396d444ffb7aed0f03770bd93ff4612a2645614bf9d7b64558f549f33e5c519f
                                                    • Instruction Fuzzy Hash: 2C419370701612AFDB049F75CA88E9DBBB9FF45299F10027AE529D7691DB30AC10CB91
                                                    APIs
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,00000000,00000000,00000000,?,6C74754C,00000000,00000000,?,6C8B4130,?,6C745829,?,?,?), ref: 6C747568
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C747575
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C747580
                                                    • GlobalFree.KERNEL32(00000000), ref: 6C747587
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C7475A5
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 6C7475B2
                                                    • EnterCriticalSection.KERNEL32(6C911F5C,00000000), ref: 6C7475CB
                                                    • LeaveCriticalSection.KERNEL32(6C911F5C,00000000), ref: 6C747632
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$CriticalSectionUnlock$AllocCreateEnterFreeLeaveLockStream
                                                    • String ID:
                                                    • API String ID: 295443201-0
                                                    • Opcode ID: 225ac87573e34b7e829a99835d41abbdedaced8aa71e37dd4711b6366f99234d
                                                    • Instruction ID: 3600ba39c3e5db68a9f8f0d0b35866c49448866b8beefc5a45973c6748bea998
                                                    • Opcode Fuzzy Hash: 225ac87573e34b7e829a99835d41abbdedaced8aa71e37dd4711b6366f99234d
                                                    • Instruction Fuzzy Hash: 2431CF31700215ABCF119B25D90EB9E77B9EF4A399F204024E909DBB40DB78D910CBA0
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C7C155C
                                                    • EnterCriticalSection.KERNEL32(6C6D14F3,00000010,6C7C1786,?,00000000,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C156D
                                                    • TlsGetValue.KERNEL32(?,?,00000000,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C1589
                                                    • LocalAlloc.KERNEL32(00000000,00000000,00000010,?,?,00000000,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C15F2
                                                    • LocalReAlloc.KERNEL32(?,00000000,00000002,00000010,?,?,00000000,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C1600
                                                    • TlsSetValue.KERNEL32(?,00000000), ref: 6C7C1631
                                                    • LeaveCriticalSection.KERNEL32(00000000,?,00000000,?,6C75D391,?,?,?,6C758C8A,00000000,?), ref: 6C7C164F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AllocCriticalLocalSectionValue$EnterH_prolog3_catchLeave
                                                    • String ID:
                                                    • API String ID: 1707010094-0
                                                    • Opcode ID: 56aaf44dbec3b5ac58631035531bf210345bcfe9ac405b4598766ff6467c52a1
                                                    • Instruction ID: 046b8a99afd154b3c0d62c524061b2640ee27aca8dcaba43b2b7e9cf51c9d881
                                                    • Opcode Fuzzy Hash: 56aaf44dbec3b5ac58631035531bf210345bcfe9ac405b4598766ff6467c52a1
                                                    • Instruction Fuzzy Hash: C231AB71A00606DFDB35DF19D648A5BBBB1FF41328B148439E866ABB50CB30E941CF92
                                                    APIs
                                                    • ScreenToClient.USER32(?,?), ref: 6C7EF97B
                                                    • GetParent.USER32(?), ref: 6C7EF98B
                                                    • GetClientRect.USER32(?,?), ref: 6C7EF9CF
                                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C7EF9E1
                                                    • PtInRect.USER32(?,?,?), ref: 6C7EF9F1
                                                    • GetClientRect.USER32(?,?), ref: 6C7EFA1E
                                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C7EFA30
                                                    • PtInRect.USER32(?,?,?), ref: 6C7EFA40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$PointsWindow$ParentScreen
                                                    • String ID:
                                                    • API String ID: 1944725958-0
                                                    • Opcode ID: d2bfff72d6616e551711a623d74b8fb83bedc3c8f77b63f939522186a42e06b8
                                                    • Instruction ID: e8dd495e2a2ae8a57403a7df82964384b4f21f13a09c159d8684c3969f4a8478
                                                    • Opcode Fuzzy Hash: d2bfff72d6616e551711a623d74b8fb83bedc3c8f77b63f939522186a42e06b8
                                                    • Instruction Fuzzy Hash: 25316B73600219ABCF119FA4D948CAEBBB9FF493487200129F956DB650EB31DE14CB91
                                                    APIs
                                                      • Part of subcall function 6C77B03E: GetCursorPos.USER32(00000000), ref: 6C77B07E
                                                      • Part of subcall function 6C77B03E: OffsetRect.USER32(?,?,?), ref: 6C77B09F
                                                      • Part of subcall function 6C77B03E: RedrawWindow.USER32(?,00000000,00000000,00000105,?,00000000,?,?,?,?), ref: 6C77B0E2
                                                    • PtInRect.USER32(?,?,?), ref: 6C71B9E5
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C71BA16
                                                    • UpdateWindow.USER32(?), ref: 6C71BA1F
                                                    • IsRectEmpty.USER32(?), ref: 6C71BA2C
                                                    • PtInRect.USER32(?,?,?), ref: 6C71BA3D
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C71BA6E
                                                    • UpdateWindow.USER32(?), ref: 6C71BA77
                                                    • TrackMouseEvent.USER32(?), ref: 6C71BAA8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Window$InvalidateUpdate$CursorEmptyEventMouseOffsetRedrawTrack
                                                    • String ID:
                                                    • API String ID: 898900272-0
                                                    • Opcode ID: fa5a8e8a1a7bb561db497000ed43cd6eccbcf672bb15101e4ee0eb52d3ce9e47
                                                    • Instruction ID: ccd62d7bc4bea9d0b16d153343c609c800f4e4a991651923afad9b0b556ef535
                                                    • Opcode Fuzzy Hash: fa5a8e8a1a7bb561db497000ed43cd6eccbcf672bb15101e4ee0eb52d3ce9e47
                                                    • Instruction Fuzzy Hash: E0318BB1504309EFDF218F30C908BAB7BF4FB49349F14482CF9AA82950E7B1A440CB91
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000031), ref: 6C761CE0
                                                    • GetSystemMetrics.USER32(00000032), ref: 6C761CEE
                                                    • SetRectEmpty.USER32(0000016C), ref: 6C761D01
                                                    • EnumDisplayMonitors.USER32(00000000,00000000,6C7624AA,0000016C,?,?,?,6C706607), ref: 6C761D11
                                                    • SystemParametersInfoW.USER32(00000030,00000000,0000016C,00000000), ref: 6C761D20
                                                    • SystemParametersInfoW.USER32(00001002,00000000,00000190,00000000), ref: 6C761D4D
                                                    • SystemParametersInfoW.USER32(00001012,00000000,00000194,00000000), ref: 6C761D61
                                                    • SystemParametersInfoW.USER32 ref: 6C761D87
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                                    • String ID:
                                                    • API String ID: 2614369430-0
                                                    • Opcode ID: 4f658cc0d74792a73ee1e7e4da1af93415227421b20788737051567a0d2a9465
                                                    • Instruction ID: c5e4f26c7e088dad6373dff8eff64937934138fcff91f37534963d18de4f3f6f
                                                    • Opcode Fuzzy Hash: 4f658cc0d74792a73ee1e7e4da1af93415227421b20788737051567a0d2a9465
                                                    • Instruction Fuzzy Hash: 8521E5B0301615BFEB148F71D849EE2FAACFF0A789F00412AA969C7140DBB09951CBE1
                                                    APIs
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C70470C
                                                    • lstrcmpW.KERNEL32(00000000,?), ref: 6C704725
                                                    • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6C70473A
                                                    • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C70475A
                                                    • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C704762
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C704770
                                                    • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6C704781
                                                    • ClosePrinter.WINSPOOL.DRV(?), ref: 6C704799
                                                      • Part of subcall function 6C7C0DA5: GlobalFlags.KERNEL32(?), ref: 6C7C0DB2
                                                      • Part of subcall function 6C7C0DA5: GlobalUnlock.KERNEL32(?), ref: 6C7C0DC0
                                                      • Part of subcall function 6C7C0DA5: GlobalFree.KERNEL32(?), ref: 6C7C0DCC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                    • String ID:
                                                    • API String ID: 168474834-0
                                                    • Opcode ID: ac3bd37b9e531cbc171c91875ff7396318c472ac674dc3b45baee3e859a41e30
                                                    • Instruction ID: b2fd487f037f6680b9fdb5e6f0367c13f7e8c40435b2d2bf828d18aab6fa4de0
                                                    • Opcode Fuzzy Hash: ac3bd37b9e531cbc171c91875ff7396318c472ac674dc3b45baee3e859a41e30
                                                    • Instruction Fuzzy Hash: 41118BB1200608BFEF225FB4CE88EAA7AECEF01789B100439B61195920D771DD50EB60
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000020), ref: 6C7C893A
                                                    • GetSystemMetrics.USER32(00000021), ref: 6C7C8944
                                                    • GetSystemMetrics.USER32(00000005), ref: 6C7C8953
                                                    • GetSystemMetrics.USER32(00000006), ref: 6C7C895D
                                                    • GetSystemMetrics.USER32(0000005C), ref: 6C7C8974
                                                    • GetSystemMetrics.USER32(0000005C), ref: 6C7C897E
                                                    • GetSystemMetrics.USER32(00000007), ref: 6C7C8996
                                                    • GetSystemMetrics.USER32(00000008), ref: 6C7C89A0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID:
                                                    • API String ID: 4116985748-0
                                                    • Opcode ID: fc2d3b06b458fe950d40823c51872d94b8e6dbab7b7c8d21022dfe9ab04d8606
                                                    • Instruction ID: 4a4e648e0b3cc0fc2f6d640f1ea61e4e795e136c0488ab76c889bac34187f7c3
                                                    • Opcode Fuzzy Hash: fc2d3b06b458fe950d40823c51872d94b8e6dbab7b7c8d21022dfe9ab04d8606
                                                    • Instruction Fuzzy Hash: 51111C717417029FEB204FA4DA08B56BBF4AF1575AF104439F6A5CB680DB749890CB53
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C716506
                                                    • GetWindow.USER32(?,00000005), ref: 6C716575
                                                      • Part of subcall function 6C716F6C: __EH_prolog3.LIBCMT ref: 6C716F73
                                                      • Part of subcall function 6C716F6C: GetWindow.USER32(?,00000005), ref: 6C716F91
                                                      • Part of subcall function 6C716F6C: GetWindow.USER32(?,00000002), ref: 6C716FCA
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$H_prolog3
                                                    • String ID:
                                                    • API String ID: 1351209170-0
                                                    • Opcode ID: ab91d6c04e7c4deecf20bede18e963c9ca14a0b6f2010a47fd590a643fc0f9c4
                                                    • Instruction ID: 5af3ff5f20cdf9b8f96691ff91e19ab17aae1223b57f4a71d5b7a278b5138fa1
                                                    • Opcode Fuzzy Hash: ab91d6c04e7c4deecf20bede18e963c9ca14a0b6f2010a47fd590a643fc0f9c4
                                                    • Instruction Fuzzy Hash: 8FF14875B052259FCF04DF64CA58AADBBB5FF49314F180069E812E7B90CB34AE05CB91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$Rect$Empty$Window
                                                    • String ID:
                                                    • API String ID: 1870126367-0
                                                    • Opcode ID: 88282680af7a328da6632a3c74e81a5069a64d89134da4dbebbd22915b2536ea
                                                    • Instruction ID: 4a3101e58a00cf8170ff6eeed81f74378406a7a424cee0ea05ed62f57b8241a4
                                                    • Opcode Fuzzy Hash: 88282680af7a328da6632a3c74e81a5069a64d89134da4dbebbd22915b2536ea
                                                    • Instruction Fuzzy Hash: 5BC14575B002199FCF05DFA5C899ABE7BB6FF49350F150069E906A7790CB34AD41CB90
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C70AF20
                                                    • InflateRect.USER32(?,00000002,00000000), ref: 6C70B11C
                                                      • Part of subcall function 6C7D0BCD: SetRectEmpty.USER32(?), ref: 6C7D0BE6
                                                    • IsRectEmpty.USER32(?), ref: 6C70B1B7
                                                      • Part of subcall function 6C75913E: GetParent.USER32(?), ref: 6C75916A
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DB7
                                                      • Part of subcall function 6C702DA8: ScreenToClient.USER32(?,?), ref: 6C702DC4
                                                    • GetWindowRect.USER32(?,?), ref: 6C70B1F0
                                                    • UnionRect.USER32(?,?,?), ref: 6C70B214
                                                    • EqualRect.USER32(?,?), ref: 6C70B222
                                                    • OffsetRect.USER32(?,?,?), ref: 6C70B23F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$ClientEmptyScreen$EqualH_prolog3_InflateOffsetParentUnionWindow
                                                    • String ID:
                                                    • API String ID: 1622821726-0
                                                    • Opcode ID: 7d445b659f6985231bece8e3d38eebdaf73df72c9b2e434dd8a6f4ffe607f693
                                                    • Instruction ID: 2004f890039c1790cd04a89978a0dce35c1b073c98eaa7b9b2065222485e05a3
                                                    • Opcode Fuzzy Hash: 7d445b659f6985231bece8e3d38eebdaf73df72c9b2e434dd8a6f4ffe607f693
                                                    • Instruction Fuzzy Hash: C4C1E7B5A006199FCB05DFA4C988ADEBBFAFF49314F10415AE816E7350DB70AE45CB90
                                                    APIs
                                                    • GetDlgCtrlID.USER32(?), ref: 6C763B5B
                                                      • Part of subcall function 6C790CB0: ShowWindow.USER32(?,?,?,?,6C781B94,00000005,0000EA20), ref: 6C790CC1
                                                      • Part of subcall function 6C7638E7: GetDesktopWindow.USER32 ref: 6C7638F0
                                                      • Part of subcall function 6C7638E7: GetWindow.USER32(00000000), ref: 6C7638F7
                                                      • Part of subcall function 6C7638E7: GetWindowLongW.USER32(00000000,000000F0), ref: 6C763925
                                                      • Part of subcall function 6C7638E7: ShowWindow.USER32(00000000,00000000,?,?,6C763DB1,00000001), ref: 6C763940
                                                      • Part of subcall function 6C7638E7: GetWindow.USER32(00000000,00000002), ref: 6C76396E
                                                    • GetDlgItem.USER32(00000000,?), ref: 6C763C18
                                                    • ShowWindow.USER32(00000000,00000000), ref: 6C763C26
                                                    • GetMenu.USER32(?), ref: 6C763C38
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 6C763C54
                                                    • GetDlgItem.USER32(?,0000E900), ref: 6C763CA0
                                                    • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C763CB4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$ItemLong$CtrlDesktopInvalidateMenuRect
                                                    • String ID:
                                                    • API String ID: 1616503434-0
                                                    • Opcode ID: 20c6d3ac835235b01962adea94d25ffec026ab5cb19719f0adf4341e4c7005d3
                                                    • Instruction ID: 55c375a389da5ddaa9dac5950560b7301be9025eff19f9948bdc03af502e45a1
                                                    • Opcode Fuzzy Hash: 20c6d3ac835235b01962adea94d25ffec026ab5cb19719f0adf4341e4c7005d3
                                                    • Instruction Fuzzy Hash: EEA16A31B00615DFDB04CF26C999BADB7B5BF49314F104269EC26ABB80DB30AD04CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71C47B
                                                    • InflateRect.USER32(?,?,00000000), ref: 6C71C50F
                                                    • InflateRect.USER32(?,000000F6,00000000), ref: 6C71C524
                                                    • InflateRect.USER32(?,00000000,000000FD), ref: 6C71C5F4
                                                    • InflateRect.USER32(?,?,?), ref: 6C71C609
                                                    • GetTextColor.GDI32(?), ref: 6C71C674
                                                    • Polygon.GDI32(00000000,?,00000003), ref: 6C71C6C0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InflateRect$ColorH_prolog3_PolygonText
                                                    • String ID:
                                                    • API String ID: 2032528157-0
                                                    • Opcode ID: 55666b300b911f969afbc5b958bfbc8cffc5c32a39283495b2a10d45732be012
                                                    • Instruction ID: 52112dc9950555e0172d4e3a87476f134bd8bc0e3c898fdc67731d0d40997b3f
                                                    • Opcode Fuzzy Hash: 55666b300b911f969afbc5b958bfbc8cffc5c32a39283495b2a10d45732be012
                                                    • Instruction Fuzzy Hash: 0EA15E71E00118DFCF01DFA8C9889EDBBB6FF49315F14423AE815AB684DB719946CB90
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C72072F
                                                    • GetParent.USER32(?), ref: 6C72089F
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CtrlH_prolog3_catchParent
                                                    • String ID: %TsMFCOutlookBar-%d$%TsMFCOutlookBar-%d%x$MFCOutlookBars$MFCOutlookCustomPages
                                                    • API String ID: 1043288792-3944741965
                                                    • Opcode ID: 6a838979fdfdc9ee2c20ad48901ad264b5e145a8b9951df0ba68b5aa679cab4c
                                                    • Instruction ID: 77f4ed17b95411af73cbf0b27bda54bfd7f1c68516117f9278412b9361926fd5
                                                    • Opcode Fuzzy Hash: 6a838979fdfdc9ee2c20ad48901ad264b5e145a8b9951df0ba68b5aa679cab4c
                                                    • Instruction Fuzzy Hash: F4819471A00249DFCF05DFA4CA58AEE7B75BF49318F1401A9E815A7790DF349E09CB61
                                                    APIs
                                                      • Part of subcall function 6C7212F9: IsWindow.USER32(?), ref: 6C721305
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C75FB1B
                                                      • Part of subcall function 6C721977: GetClientRect.USER32(?,?), ref: 6C72199F
                                                      • Part of subcall function 6C721977: PtInRect.USER32(?,00000000,?), ref: 6C7219B9
                                                    • ScreenToClient.USER32(?,?), ref: 6C75F9E8
                                                    • PtInRect.USER32(?,?,?), ref: 6C75F9FB
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C75FA2D
                                                    • GetParent.USER32(?), ref: 6C75FA5D
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C75FADB
                                                    • GetFocus.USER32 ref: 6C75FAE1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageRectSend$Client$FocusParentScreenWindow
                                                    • String ID:
                                                    • API String ID: 1639644240-0
                                                    • Opcode ID: 283e6822e481848617a120ef64cbb9686b619b66ebfc08046985bda5da2b526c
                                                    • Instruction ID: 52bf8e6ad828fc63ef4f1c11fee87787cc32881aae7c80ea8496591838cf467b
                                                    • Opcode Fuzzy Hash: 283e6822e481848617a120ef64cbb9686b619b66ebfc08046985bda5da2b526c
                                                    • Instruction Fuzzy Hash: 79516975E01209EFDF10DBA9CA58E9EBBB8FF8A348B504069E811E7650DF31D910CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C7141D1
                                                      • Part of subcall function 6C76BEE5: __EH_prolog3.LIBCMT ref: 6C76BEEC
                                                    • GetMenuItemCount.USER32(?), ref: 6C714227
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C714244
                                                    • GetMenuItemCount.USER32(?), ref: 6C714279
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C7142AB
                                                    • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6C714310
                                                    • GetMenuState.USER32(00000001,00000000,00000400), ref: 6C71436D
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$Count$H_prolog3H_prolog3_MessageSendState
                                                    • String ID:
                                                    • API String ID: 999183886-0
                                                    • Opcode ID: eacb9dccc559e3ff465dec9a5a3ee89ee69e4fc70eecd2f5568b3dfeaeee1a4f
                                                    • Instruction ID: 9c3b173afb3dbe397a302aee30bd3371f4cd51c6ce630794743b9f002986cee5
                                                    • Opcode Fuzzy Hash: eacb9dccc559e3ff465dec9a5a3ee89ee69e4fc70eecd2f5568b3dfeaeee1a4f
                                                    • Instruction Fuzzy Hash: DA61A030A041569BDF25CF25CE48BEDB6B4AF0535CF2442B9E839A6ED0DB309A85DF44
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C8119DE
                                                    • GlobalAlloc.KERNEL32(00000040,00000004,?), ref: 6C811B45
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C811B52
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C811B63
                                                    • SetPropW.USER32(0000000F,00000000), ref: 6C811B73
                                                    • GlobalFree.KERNEL32(00000000), ref: 6C811B7E
                                                    • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 6C811BD3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFreeH_prolog3LockMessagePropSendUnlock
                                                    • String ID:
                                                    • API String ID: 2232441401-0
                                                    • Opcode ID: a1d3d7a128d1d720a8bc15d9f32bb66ec6cd1bec35d970c1290e08208bbb88d0
                                                    • Instruction ID: 02e3c055032ecbd2a12af2dc07bc61c62b9698f5203f669f7ebc086885abb00b
                                                    • Opcode Fuzzy Hash: a1d3d7a128d1d720a8bc15d9f32bb66ec6cd1bec35d970c1290e08208bbb88d0
                                                    • Instruction Fuzzy Hash: 9551E07070420AAFDB209F75CA48B9A7BF4BF05358F204928E9299BF91DF74D905CB90
                                                    APIs
                                                      • Part of subcall function 6C7C89B1: IsWindow.USER32(00000000), ref: 6C7C89D0
                                                    • IsWindowVisible.USER32(00000000), ref: 6C76CF9B
                                                    • IsWindowVisible.USER32(00000000), ref: 6C76CFB6
                                                    • IsWindowVisible.USER32(00000000), ref: 6C76D016
                                                    • IsWindowVisible.USER32(00000000), ref: 6C76D04C
                                                    • IsWindowVisible.USER32(00000000), ref: 6C76D05F
                                                    • IsZoomed.USER32(00000000), ref: 6C76D08C
                                                    • GetSystemMetrics.USER32(00000004), ref: 6C76D0FC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Visible$MetricsSystemZoomed
                                                    • String ID:
                                                    • API String ID: 890500415-0
                                                    • Opcode ID: 63856c73614fc349f9aaa5dba7ef1d84c47146b61bc261b40b3ba5c2951f94d3
                                                    • Instruction ID: e07dd2373cd0b0d0e5a1cf359ba2a5b294855aa25c59eab3051b8f3f0d248c8b
                                                    • Opcode Fuzzy Hash: 63856c73614fc349f9aaa5dba7ef1d84c47146b61bc261b40b3ba5c2951f94d3
                                                    • Instruction Fuzzy Hash: D051BC30B10206DFDB04CF66CA48BA9BBB4BF18349F254179D864D7E61EB70D891CB96
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7303D3
                                                      • Part of subcall function 6C7713D1: __EH_prolog3.LIBCMT ref: 6C7713D8
                                                      • Part of subcall function 6C7713D1: SetRectEmpty.USER32(?), ref: 6C7715CE
                                                      • Part of subcall function 6C807A0F: __EH_prolog3.LIBCMT ref: 6C807A16
                                                    • SetRectEmpty.USER32(?), ref: 6C73055C
                                                    • SetRectEmpty.USER32(?), ref: 6C730563
                                                    • SetRectEmpty.USER32(?), ref: 6C730596
                                                    • SetRectEmpty.USER32(?), ref: 6C730600
                                                    • SetRectEmpty.USER32(?), ref: 6C73060D
                                                    • SetRectEmpty.USER32(?), ref: 6C73061A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3
                                                    • String ID:
                                                    • API String ID: 3752103406-0
                                                    • Opcode ID: 8c3ecd7a678ba3c90a4b21b01ac67dede579e69df9eea1a4d7792e6573ed1941
                                                    • Instruction ID: 69095943994197b0e82156f7ee970df58d1782ed31bdaf329d7e4ec6e3b91890
                                                    • Opcode Fuzzy Hash: 8c3ecd7a678ba3c90a4b21b01ac67dede579e69df9eea1a4d7792e6573ed1941
                                                    • Instruction Fuzzy Hash: 3271EEB0905B158FCB65CF68D58868AFBF4BF09304F54896ED4AEAB311CB306A04CF85
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 6C86CDE7
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6C86CDEF
                                                    • _ValidateLocalCookies.LIBCMT ref: 6C86CE78
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6C86CEA3
                                                    • _ValidateLocalCookies.LIBCMT ref: 6C86CEF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: f66f8535856617f5e4466b2f433593e624643fbe4a4f52ef7dfb0ebf126cb573
                                                    • Instruction ID: b3dd6b8eda870e3bf173e8754d6e8c437d62316b24a796ef2ffeb36b78ec70e3
                                                    • Opcode Fuzzy Hash: f66f8535856617f5e4466b2f433593e624643fbe4a4f52ef7dfb0ebf126cb573
                                                    • Instruction Fuzzy Hash: 2F41C734A012199BCF20EF6EC940ADE7BB1BF46318F248965E8149BF92D731DE05CB90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C72850A
                                                      • Part of subcall function 6C7C7433: __EH_prolog3.LIBCMT ref: 6C7C743A
                                                      • Part of subcall function 6C7DA97B: SetRectEmpty.USER32(?), ref: 6C7DA9B0
                                                    • SetRectEmpty.USER32(?), ref: 6C72863A
                                                    • SetRectEmpty.USER32 ref: 6C72864B
                                                    • SetRectEmpty.USER32(?), ref: 6C728652
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3
                                                    • String ID: False$True
                                                    • API String ID: 3752103406-1895882422
                                                    • Opcode ID: c7551f44fe5bd228f3e43d16cbeb7d3c89e4fc8b7d20a96b351222ec96c2cf96
                                                    • Instruction ID: 05fec53beee698cad13a44ad2979ad549dcc9aca264a09073768bcf3cd39f272
                                                    • Opcode Fuzzy Hash: c7551f44fe5bd228f3e43d16cbeb7d3c89e4fc8b7d20a96b351222ec96c2cf96
                                                    • Instruction Fuzzy Hash: 1C5128B09052018FCB0ACF18D5887E9BBE8BF08304F1981BEE81C9F756CB745644CB65
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C779AFA
                                                    • CopyRect.USER32(?,?), ref: 6C779BA8
                                                    • IsRectEmpty.USER32(?), ref: 6C779BC0
                                                    • IsRectEmpty.USER32(?), ref: 6C779BD8
                                                    • IsRectEmpty.USER32(?), ref: 6C779BED
                                                      • Part of subcall function 6C76201B: __EH_prolog3.LIBCMT ref: 6C762022
                                                      • Part of subcall function 6C76201B: LoadCursorW.USER32(00000000,00007F00), ref: 6C762046
                                                      • Part of subcall function 6C76201B: GetClassInfoW.USER32(?,?,?), ref: 6C762081
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
                                                    • String ID: Afx:ControlBar
                                                    • API String ID: 685170547-4244778371
                                                    • Opcode ID: 863e28860122321f7adc9285dd4465571b3fa5e74e16d02e2056220165cc7518
                                                    • Instruction ID: 6dad54532277be90996335109916b358a49cd77df92c49ef1279c6bfb937779a
                                                    • Opcode Fuzzy Hash: 863e28860122321f7adc9285dd4465571b3fa5e74e16d02e2056220165cc7518
                                                    • Instruction Fuzzy Hash: F2412771A012099FDF11DFA4CA88AEE77F9BF49308F100469EC05BB650DB71AA09CB71
                                                    APIs
                                                    • IsWindow.USER32(00000000), ref: 6C76AFF8
                                                    • IsWindow.USER32(?), ref: 6C76B2A5
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C76B2E2
                                                    • OffsetRect.USER32(?,?,?), ref: 6C76B2F2
                                                    • CopyRect.USER32(?,?), ref: 6C76B308
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow$CopyInfoOffsetParametersSystem
                                                    • String ID: ,
                                                    • API String ID: 1377071818-3772416878
                                                    • Opcode ID: 04836d9613fa7ca71894f18c791912bfe54aed062f0fcbbe1a081046be7f27f3
                                                    • Instruction ID: 823a2fda4ff055981f4d6e2b0a76a1f2ee8fa65223a7ba9e5b2a5e42b2eb91ca
                                                    • Opcode Fuzzy Hash: 04836d9613fa7ca71894f18c791912bfe54aed062f0fcbbe1a081046be7f27f3
                                                    • Instruction Fuzzy Hash: DE314C71700209AFDF14DBAADA48EAEB7B9FF49355F14006AE515D7640DB30E804DBA1
                                                    APIs
                                                    • __EH_prolog3_catch_GS.LIBCMT ref: 6C76DCFD
                                                    • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000228,6C77E264,?,00000001,00000000,?,00000004,6C77DE58,80000000,?,80000000), ref: 6C76DDA3
                                                      • Part of subcall function 6C76DBCD: __EH_prolog3.LIBCMT ref: 6C76DBD4
                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C76DDC7
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 6C76DE7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                                                    • String ID: Software\Classes\
                                                    • API String ID: 854624316-1121929649
                                                    • Opcode ID: b28211a8965be957af732483f9195a48a92f6d12490d50fec054d070580dcedf
                                                    • Instruction ID: 6dda0b7ce127c319c5774db63c8b61aede5cb8f4ec50f32b4ea9f45a195bd0f3
                                                    • Opcode Fuzzy Hash: b28211a8965be957af732483f9195a48a92f6d12490d50fec054d070580dcedf
                                                    • Instruction Fuzzy Hash: 2841E372A10118ABCB21DBA5DE8CFDD77B8AF68318F2401A9D804A7B40CB70DE48CB51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C855691
                                                    • GetKeyboardLayout.USER32(00000000), ref: 6C8556CE
                                                    • MapVirtualKeyExW.USER32(00000000,00000000,00000000), ref: 6C8556D7
                                                    • GetKeyNameTextW.USER32(00000000,?,00000032), ref: 6C8556FE
                                                    • IsCharLowerW.USER32(?,00000000,?,00000000), ref: 6C85573B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CharH_prolog3_KeyboardLayoutLowerNameTextVirtual
                                                    • String ID: Pause
                                                    • API String ID: 2563161834-375111145
                                                    • Opcode ID: 733645a7e4588e19968dabc81c0d18c2cc40d8661a8125518d6601402759caa3
                                                    • Instruction ID: 3f15435d79fa17f1465782c5fc85bc6edb174ac413ec12f1257855c603d573a5
                                                    • Opcode Fuzzy Hash: 733645a7e4588e19968dabc81c0d18c2cc40d8661a8125518d6601402759caa3
                                                    • Instruction Fuzzy Hash: D631A471D00214DBDB30DBB4DE88DEEB778AF46308F50482DE461A7A81DBB4AD59CB61
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: __snprintf_s$ClassInfo
                                                    • String ID: '@ql$Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                                    • API String ID: 1341824228-2563200095
                                                    • Opcode ID: d2c22480e13601cf34574c0905fc072fc3a7fa604a02fe03e0925408dd1d3e20
                                                    • Instruction ID: 362f41419eccf13ce2044840c1c95a56bda2585c7adde40756c927fd6621ed19
                                                    • Opcode Fuzzy Hash: d2c22480e13601cf34574c0905fc072fc3a7fa604a02fe03e0925408dd1d3e20
                                                    • Instruction Fuzzy Hash: DA3181B0900208EFCB11DFAACA44ADE7BF4EF59398F008426F914ABB50DB749955CF61
                                                    APIs
                                                    • LockWindowUpdate.USER32(00000000,00000004,00000004), ref: 6C78C590
                                                    • ValidateRect.USER32(?,00000000,0000E800), ref: 6C78C5CC
                                                    • UpdateWindow.USER32(?), ref: 6C78C5D5
                                                    • LockWindowUpdate.USER32(00000000), ref: 6C78C5E6
                                                    • ValidateRect.USER32(?,00000000,0000E800), ref: 6C78C614
                                                    • UpdateWindow.USER32(?), ref: 6C78C61D
                                                    • LockWindowUpdate.USER32(00000000), ref: 6C78C62E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: UpdateWindow$Lock$RectValidate
                                                    • String ID:
                                                    • API String ID: 797752328-0
                                                    • Opcode ID: 470cee2f999a4353094bb3785ba5d673921610f79e6b2568c3d1ac8c2d042c9e
                                                    • Instruction ID: ffa43e5d4e2f14eea3479c6af9e69fcd8805dc0b90756adf5a00cfc03123dabe
                                                    • Opcode Fuzzy Hash: 470cee2f999a4353094bb3785ba5d673921610f79e6b2568c3d1ac8c2d042c9e
                                                    • Instruction Fuzzy Hash: B7318F72A02604EFDF10AF64DA48F4ABBB5FF4474AF204279E955A7694DB30ED00CB50
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C7064AB
                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 6C706505
                                                    • IsAppThemed.UXTHEME(?,?,00000001,?), ref: 6C706596
                                                    • GetStockObject.GDI32(00000005), ref: 6C7065A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassH_prolog3_NameObjectStockThemed
                                                    • String ID: Button$Static
                                                    • API String ID: 2434646892-2498952662
                                                    • Opcode ID: 0bea92efbb73532e0bbdbed9f018e37f31d71b1787aecfa5f73bbb1b99198789
                                                    • Instruction ID: 58745d55907f2a8cd1f9e449ec8efca792d9a9f76c259341e997d75a937fa148
                                                    • Opcode Fuzzy Hash: 0bea92efbb73532e0bbdbed9f018e37f31d71b1787aecfa5f73bbb1b99198789
                                                    • Instruction Fuzzy Hash: DB3191B1B402199BDF24DB54CA6CBD973F4AF1531CF1046A8A929D7A80DB30ABC4CB51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C80A826
                                                      • Part of subcall function 6C80A910: __EH_prolog3.LIBCMT ref: 6C80A917
                                                      • Part of subcall function 6C80A910: GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C80A96A
                                                      • Part of subcall function 6C80A910: GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C80A980
                                                    • CopyRect.USER32(?,?), ref: 6C80A85B
                                                    • GetCursorPos.USER32(?), ref: 6C80A86D
                                                    • SetRect.USER32(?,?,?,?,?), ref: 6C80A880
                                                    • IsRectEmpty.USER32(?), ref: 6C80A89B
                                                    • InflateRect.USER32(?,00000002,00000002), ref: 6C80A8AD
                                                    • DoDragDrop.OLE32(00000000,00000000,?,?), ref: 6C80A8F5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Profile$CopyCursorDragDropEmptyH_prolog3H_prolog3_Inflate
                                                    • String ID:
                                                    • API String ID: 1837043813-0
                                                    • Opcode ID: 0de666e8f97ea27a8f159f50d0e0c6bd36c05c9217158dacab72475155cc3dac
                                                    • Instruction ID: 04f16332ae75f3716ddac806f8f74150b22d2a0fb041446bbb5616a1b474811b
                                                    • Opcode Fuzzy Hash: 0de666e8f97ea27a8f159f50d0e0c6bd36c05c9217158dacab72475155cc3dac
                                                    • Instruction Fuzzy Hash: 1A312975B012199FDF11DFE4CA48DED7BB9FF49348B004425E815AB744CB349A4ACBA1
                                                    APIs
                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,3F4930F2,?,6C885E8C,6C880602,?,00000000,?), ref: 6C885E3E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID: api-ms-$ext-ms-
                                                    • API String ID: 3664257935-537541572
                                                    • Opcode ID: b19d1396e2b31c7f405571c086096a5322853310628a6ffe104d214d87645159
                                                    • Instruction ID: 06f4bbd270bae8fc2f4c0d80d240cc85ac750df971e7746f1fca125322594309
                                                    • Opcode Fuzzy Hash: b19d1396e2b31c7f405571c086096a5322853310628a6ffe104d214d87645159
                                                    • Instruction Fuzzy Hash: 9521EB71B0B310ABE731DA65DD45A4A7779EB423B9F260924E916A7E80D730ED00C6E0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Destroy$AcceleratorH_prolog3ParentTable
                                                    • String ID:
                                                    • API String ID: 2502036937-0
                                                    • Opcode ID: fe854a40b788356df6d44ec246ec368a8152eaafdc3eefb19692a5764d47cefd
                                                    • Instruction ID: 4e40eeac90a260abd2dc5dd201041bc115ffb267bf9f3dc9e264481875b55620
                                                    • Opcode Fuzzy Hash: fe854a40b788356df6d44ec246ec368a8152eaafdc3eefb19692a5764d47cefd
                                                    • Instruction Fuzzy Hash: 9F219A70708304ABDB219F61CA8CF8E76B5BF8531CF190928E856A7E40DB30E944EB65
                                                    APIs
                                                    • RealChildWindowFromPoint.USER32(?,?,?,?,?), ref: 6C7C0CC9
                                                    • ClientToScreen.USER32(?,?), ref: 6C7C0CE3
                                                    • GetWindow.USER32(?,00000005), ref: 6C7C0D35
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$ChildClientFromPointRealScreen
                                                    • String ID:
                                                    • API String ID: 2518355518-0
                                                    • Opcode ID: a13d7206191a6fa8d8edc0904a68679dcf126c3ee8d1e3b8256de1c41ed2724b
                                                    • Instruction ID: 552dce866fde863d87fc2a8a39549a345b312756f103a092dc9c919ba5b34445
                                                    • Opcode Fuzzy Hash: a13d7206191a6fa8d8edc0904a68679dcf126c3ee8d1e3b8256de1c41ed2724b
                                                    • Instruction Fuzzy Hash: 28117271B0165AAFCB119F65C909EEF77B8AF4A345B204139F521E3240DB34DA45CBD2
                                                    APIs
                                                    • GetParent.USER32(?), ref: 6C75D82D
                                                    • GetWindowRect.USER32(?,?), ref: 6C75D84B
                                                    • ScreenToClient.USER32(?,?), ref: 6C75D858
                                                    • ScreenToClient.USER32(?,?), ref: 6C75D865
                                                    • EqualRect.USER32(?,0000E900), ref: 6C75D870
                                                    • DeferWindowPos.USER32(?,?,00000000,0000E900,?,?,?,00000014), ref: 6C75D897
                                                    • SetWindowPos.USER32(?,00000000,0000E900,?,?,?,00000014,?,?,00000000,6C763411,00000000), ref: 6C75D8A1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientRectScreen$DeferEqualParent
                                                    • String ID:
                                                    • API String ID: 443303494-0
                                                    • Opcode ID: 4a796672cbd4fe562d29a42def89567ad05f23ee7089da1403d0dd66b8a49566
                                                    • Instruction ID: 005a421cefdeaaa6ad36eef72019161c8556b4e0d6e4bf212db0f65554c4a8fc
                                                    • Opcode Fuzzy Hash: 4a796672cbd4fe562d29a42def89567ad05f23ee7089da1403d0dd66b8a49566
                                                    • Instruction Fuzzy Hash: 74216D31A00209EFDF10DFA5CA84EAEBBB8FF19348B504129F901AB150DB30E950CBA1
                                                    APIs
                                                    • IsWindow.USER32(00000000), ref: 6C75C995
                                                    • FindResourceW.KERNEL32(?,00000000,AFX_DIALOG_LAYOUT,?,?,?,?,?,6C705A65,?,?), ref: 6C75C9BD
                                                    • SizeofResource.KERNEL32(?,00000000,?,?,?,?,?,6C705A65,?,?), ref: 6C75C9CF
                                                    • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,6C705A65,?,?), ref: 6C75C9DB
                                                    • LockResource.KERNEL32(00000000,?,?,?,?,?,6C705A65,?,?), ref: 6C75C9E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeofWindow
                                                    • String ID: AFX_DIALOG_LAYOUT
                                                    • API String ID: 2582447065-2436846380
                                                    • Opcode ID: dd8aa34c626f6bf89ca5e377663b1c0e0c630cd949e8e255d18ec92d50e23f6c
                                                    • Instruction ID: 5055748defbd317bc7599bd46aa61c0e07af7922b208360943213106657a079f
                                                    • Opcode Fuzzy Hash: dd8aa34c626f6bf89ca5e377663b1c0e0c630cd949e8e255d18ec92d50e23f6c
                                                    • Instruction Fuzzy Hash: 9B118675611244AFFB21AB758D4CF6B7ABDFB4D2DAB104039A912D2604EF74CC50C6A0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3
                                                    • String ID: AQUA_$BLACK_$BLUE_$IDX_OFFICE2007_STYLE$SILVER_
                                                    • API String ID: 431132790-2717817858
                                                    • Opcode ID: 60d2824840c21889296e92eb2cdf76680703f85bdc4c1f62445240771cd9b6ac
                                                    • Instruction ID: 54fdff811d4b68249a2e1c7be5e5719662557b177342eada383a073734ac9aed
                                                    • Opcode Fuzzy Hash: 60d2824840c21889296e92eb2cdf76680703f85bdc4c1f62445240771cd9b6ac
                                                    • Instruction Fuzzy Hash: 7411E2B25000099BCB04DFE8CB18AFD7BB5AF8571CF254315A4209BB80DF31EA0AD715
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(user32.dll,?,?,00000000,?,6C75B0CF,00000000,00000000), ref: 6C75BA56
                                                    • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 6C75BA68
                                                    • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 6C75BA76
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                                    • API String ID: 667068680-2470269259
                                                    • Opcode ID: 121365f73b5558a27071c878ea3a51dfe5fd9b7e24c4d5b04f05e6714ed9393e
                                                    • Instruction ID: c4d51895027db51e8ad7ef96f978f3d850515b2430fbf69d0a9de9a58be70390
                                                    • Opcode Fuzzy Hash: 121365f73b5558a27071c878ea3a51dfe5fd9b7e24c4d5b04f05e6714ed9393e
                                                    • Instruction Fuzzy Hash: 7901DB36605615AFCB619A65CD4C9697AA4FF4A365B500431E91A81F00DF74DC60C7E0
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C70463F,?,?,?,?), ref: 6C7C2E11
                                                    • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 6C7C2E21
                                                    • EncodePointer.KERNEL32(00000000,?,?,6C70463F,?,?,?,?), ref: 6C7C2E2A
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C70463F,?,?,?,?), ref: 6C7C2E38
                                                    Strings
                                                    • kernel32.dll, xrefs: 6C7C2E0C
                                                    • RegisterApplicationRecoveryCallback, xrefs: 6C7C2E1B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: RegisterApplicationRecoveryCallback$kernel32.dll
                                                    • API String ID: 2061474489-202725706
                                                    • Opcode ID: b3df2d1d82f97f05cdaef163b5bc6a6692ab28a25b4cb5d8d586eddd732f3233
                                                    • Instruction ID: 456451b23b9c7575a406fa8310d9665ae06de9fef1fcfe91b964f4551b855991
                                                    • Opcode Fuzzy Hash: b3df2d1d82f97f05cdaef163b5bc6a6692ab28a25b4cb5d8d586eddd732f3233
                                                    • Instruction Fuzzy Hash: ADF06D7170521AAF8F226E659D0D85B3F79AB0A7997040431FD15E6A10C734C810DAA1
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(shell32.dll,?,?,6C7C215D,?,00000000,6C8BBA48,00000000,?,6C6FC013,?), ref: 6C7C2F83
                                                    • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 6C7C2F93
                                                    • EncodePointer.KERNEL32(00000000,?,6C7C215D,?,00000000,6C8BBA48,00000000,?,6C6FC013,?), ref: 6C7C2F9C
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C7C215D,?,00000000,6C8BBA48,00000000,?,6C6FC013,?), ref: 6C7C2FAA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: SHCreateItemFromParsingName$shell32.dll
                                                    • API String ID: 2061474489-2320870614
                                                    • Opcode ID: ba6dd2cee6d532b6b596e953956859c46d56f7af15da7b44e6b7c2862ef31e35
                                                    • Instruction ID: 9a7530fab7880887f7a7d863b2bedb6b5fc62ec7c44685a4abefd90412ab9d36
                                                    • Opcode Fuzzy Hash: ba6dd2cee6d532b6b596e953956859c46d56f7af15da7b44e6b7c2862ef31e35
                                                    • Instruction Fuzzy Hash: 18F0907170921EAF8F215FA49E0D85A3B79AB0A3993100430FC15E6A20C734C810DFF1
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C704623,?,?), ref: 6C7C2DB2
                                                    • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 6C7C2DC2
                                                    • EncodePointer.KERNEL32(00000000,?,?,6C704623,?,?), ref: 6C7C2DCB
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C704623,?,?), ref: 6C7C2DD9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: RegisterApplicationRestart$kernel32.dll
                                                    • API String ID: 2061474489-1259503209
                                                    • Opcode ID: 68bf624d61753c513f5573ee73387f4a52e7e10b3ab0f724940231edf5b0db25
                                                    • Instruction ID: d3e183c3ac91f864f723f84756d1a4a7f3a40dbb1b216f8cc3134cc87e1f2020
                                                    • Opcode Fuzzy Hash: 68bf624d61753c513f5573ee73387f4a52e7e10b3ab0f724940231edf5b0db25
                                                    • Instruction Fuzzy Hash: 77F08232B45216AF9F216BA99D0ED593B78DB6B7EAB100431FC15D6A10DB34C800DEE5
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(user32.dll,?,?,6C7132AF,00000323,00000001,?,00000004,6C6F4B05), ref: 6C7C2F27
                                                    • GetProcAddress.KERNEL32(00000000,ChangeWindowMessageFilter), ref: 6C7C2F37
                                                    • EncodePointer.KERNEL32(00000000,?,?,6C7132AF,00000323,00000001,?,00000004,6C6F4B05), ref: 6C7C2F40
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C7132AF,00000323,00000001,?,00000004,6C6F4B05), ref: 6C7C2F4E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                    • API String ID: 2061474489-2498399450
                                                    • Opcode ID: 4b18a2f21b75e28c8195ffbf15a306bfb08e8e6b7e4a87afa02bcf8048e73753
                                                    • Instruction ID: 3816c7bdc96289d1cf867da94f5792288119f2c3161704a747cd74590dbf7560
                                                    • Opcode Fuzzy Hash: 4b18a2f21b75e28c8195ffbf15a306bfb08e8e6b7e4a87afa02bcf8048e73753
                                                    • Instruction Fuzzy Hash: 15F05E35B0921AAF8B216AA59D0DC0E3BB8EB0B7E93100431BC16D2A10D7348900DAE5
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C70465E,00000000), ref: 6C7C2E76
                                                    • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 6C7C2E86
                                                    • EncodePointer.KERNEL32(00000000,?,?,6C70465E,00000000), ref: 6C7C2E8F
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C70465E,00000000), ref: 6C7C2E9D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: ApplicationRecoveryInProgress$kernel32.dll
                                                    • API String ID: 2061474489-2899047487
                                                    • Opcode ID: be671a25cfc76e7d8a6249b129e0b5bef0b452cc4b25dc410c2bcc3e76193a22
                                                    • Instruction ID: 0be5e50d1a48b3b84f16cc75f8bd68af5904e00a7962250661fbd488a1617208
                                                    • Opcode Fuzzy Hash: be671a25cfc76e7d8a6249b129e0b5bef0b452cc4b25dc410c2bcc3e76193a22
                                                    • Instruction Fuzzy Hash: 12F01236B462169F9B216A649A0DD5B3A7C9B5B79A3141531BC15E7B00D7348800CAE5
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C7046A1,00000001), ref: 6C7C2ED2
                                                    • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 6C7C2EE2
                                                    • EncodePointer.KERNEL32(00000000,?,6C7046A1,00000001), ref: 6C7C2EEB
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C7046A1,00000001), ref: 6C7C2EF9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                    • String ID: ApplicationRecoveryFinished$kernel32.dll
                                                    • API String ID: 2061474489-1962646049
                                                    • Opcode ID: 88d18c030449ba2623378a07a71baa83b6cd98066237e15a687f34cd4f54dde6
                                                    • Instruction ID: 4c4985a33886f1e3ef364e8862dd239a833a4293514d1e6efa6b3a4a13f0b6d1
                                                    • Opcode Fuzzy Hash: 88d18c030449ba2623378a07a71baa83b6cd98066237e15a687f34cd4f54dde6
                                                    • Instruction Fuzzy Hash: 66F03035B0522A9F8F216BA49A0DC5A3B789B1B7EA3550431FC16D3A01DB24C800DAE1
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71A5EC
                                                    • GetWindow.USER32(?,00000005), ref: 6C71A620
                                                    • GetWindow.USER32(?,00000002), ref: 6C71A6B7
                                                    • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C71A6DD
                                                    • GetParent.USER32(?), ref: 6C71A857
                                                    • SendMessageW.USER32(?,00000222,?,00000000), ref: 6C71AA7F
                                                      • Part of subcall function 6C776CE0: GetParent.USER32(?), ref: 6C776D1C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageParentSendWindow$H_prolog3_
                                                    • String ID:
                                                    • API String ID: 3390663628-0
                                                    • Opcode ID: f9375d63109e0d685b3528dc3547015ca5ceb3ccf0787785a04dfd1665c42d34
                                                    • Instruction ID: 63921b09ef942a0935ebd66616542031f97195b4bf5ac352c60b5ba3f4f8f693
                                                    • Opcode Fuzzy Hash: f9375d63109e0d685b3528dc3547015ca5ceb3ccf0787785a04dfd1665c42d34
                                                    • Instruction Fuzzy Hash: D8E11F74E01208DFDF15DFA5CA98AEDBBB6BF88314F140169D415ABB90DB30AD4ACB50
                                                    APIs
                                                    • __allrem.LIBCMT ref: 6C87C7BE
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C87C7DA
                                                    • __allrem.LIBCMT ref: 6C87C7F1
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C87C80F
                                                    • __allrem.LIBCMT ref: 6C87C826
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C87C844
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                    • String ID:
                                                    • API String ID: 1992179935-0
                                                    • Opcode ID: d6d528262307924b9183e71eb2659474ae536f4962101bc3d9cf38cc4a3829f1
                                                    • Instruction ID: 79ad9900bb6547d58cfb193ec4867a626941270ac8c6e729803d0ba5aa1482f0
                                                    • Opcode Fuzzy Hash: d6d528262307924b9183e71eb2659474ae536f4962101bc3d9cf38cc4a3829f1
                                                    • Instruction Fuzzy Hash: 65910671605B15ABE330AF6DCE80B9E72A59F41768F144A2EE511D7F82FB70D9048BA0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C74C6CF
                                                    • GetWindow.USER32(?,00000005), ref: 6C74C772
                                                    • LockWindowUpdate.USER32(?,00000000,?,?,?,?,00000000,00000000,00000000,?,6C76C945,?,6C90B0B0,6C90B9D8,?,?), ref: 6C74C879
                                                    • SendMessageW.USER32(?,?,00000000,?), ref: 6C74C89B
                                                    • LockWindowUpdate.USER32(00000000,?,?,?,?,00000000,00000000,00000000,?,6C76C945,?,6C90B0B0,6C90B9D8,?,?,6C90B7FC), ref: 6C74C8A3
                                                    • PostMessageW.USER32(?,00000007,00000000,00000000), ref: 6C74C8F0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$LockMessageUpdate$H_prolog3PostSend
                                                    • String ID:
                                                    • API String ID: 1765037730-0
                                                    • Opcode ID: 9c231389ba3004990265ab2d22c4afe25e1a1fe035cbc7034e1625f48437f73a
                                                    • Instruction ID: 0e791b9ced7edcf223574b3f43a25c6c6a3270c5cdff55aba4972605e8207e4e
                                                    • Opcode Fuzzy Hash: 9c231389ba3004990265ab2d22c4afe25e1a1fe035cbc7034e1625f48437f73a
                                                    • Instruction Fuzzy Hash: 6081F471700206DBDF05AB65CB4CBAD37B9AF4575AF248039E805ABB90DF30D908CBA1
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 6C7245A3
                                                      • Part of subcall function 6C75D5E6: __snprintf_s.LIBCMT ref: 6C75D632
                                                      • Part of subcall function 6C75D5E6: GetClassInfoW.USER32(?,0000007C,?), ref: 6C75D696
                                                    • GetClientRect.USER32(?,?), ref: 6C7245E5
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D78
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D85
                                                    • IsWindowVisible.USER32(?), ref: 6C72481E
                                                    • SetTimer.USER32(00000000,0000EC15,00000000), ref: 6C724841
                                                    • InvalidateRect.USER32(?,00000000,00000001,6C9137B0,00000000,00000000,00000000,00000000,00000053), ref: 6C7248B0
                                                    • UpdateWindow.USER32(?), ref: 6C7248B9
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Client$RectScreenWindow$ClassCursorInfoInvalidateLoadTimerUpdateVisible__snprintf_s
                                                    • String ID:
                                                    • API String ID: 1642299925-0
                                                    • Opcode ID: 97824294789a8c775e81ecae26a4219abed4d5c8d9a29b4a7b51afeabdf11eae
                                                    • Instruction ID: 1da7b7386cf1e1c6bb6d8b4970647a56d848fc7ca07a506014ef0fb84038c830
                                                    • Opcode Fuzzy Hash: 97824294789a8c775e81ecae26a4219abed4d5c8d9a29b4a7b51afeabdf11eae
                                                    • Instruction Fuzzy Hash: 9BA14770A012059FDF14CF64CA98BE937B1FF49318F180179EC1AABB95DB78A845DB90
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C73DCFE
                                                    • GetClientRect.USER32(00000000,00000000), ref: 6C73DD58
                                                      • Part of subcall function 6C702BB1: __EH_prolog3.LIBCMT ref: 6C702BB8
                                                      • Part of subcall function 6C702BB1: GetDC.USER32(00000000), ref: 6C702BE4
                                                    • OffsetRect.USER32(?,00000000,00000000), ref: 6C73E151
                                                      • Part of subcall function 6C702190: SelectObject.GDI32(?,00000000), ref: 6C7021B0
                                                      • Part of subcall function 6C702190: SelectObject.GDI32(?,00000000), ref: 6C7021C6
                                                      • Part of subcall function 6C73BB2E: __EH_prolog3_GS.LIBCMT ref: 6C73BB38
                                                      • Part of subcall function 6C73BB2E: SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6C73BB63
                                                      • Part of subcall function 6C73EC1A: InflateRect.USER32(000000AC,00000000,?), ref: 6C73EC73
                                                      • Part of subcall function 6C73EC1A: RedrawWindow.USER32(00000000,000000AC,00000000,00000505,?,?,?,?,000000AC,6C71E72F), ref: 6C73EC8F
                                                      • Part of subcall function 6C702C06: ReleaseDC.USER32(00000002,00000000), ref: 6C702C3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$H_prolog3_ObjectSelect$ClientH_prolog3InflateMessageOffsetRedrawReleaseSendWindow
                                                    • String ID: /ql$/ql
                                                    • API String ID: 3000974817-3953590364
                                                    • Opcode ID: 2e2846b3ef7e58f445a4b160ce7424689b755646427382c173b270fd720a76f1
                                                    • Instruction ID: eab6d2b0a0353df5ba0a72fd7685a87dd13b27efd0abc089dc94f809df621bde
                                                    • Opcode Fuzzy Hash: 2e2846b3ef7e58f445a4b160ce7424689b755646427382c173b270fd720a76f1
                                                    • Instruction Fuzzy Hash: 69121471E00629DFDB15CFA4CA44BEDBBB2BF48304F244169E819AB741DB74A945CF80
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 6C71E73D
                                                    • SetRectEmpty.USER32(?), ref: 6C71E79B
                                                    • OffsetRect.USER32(?,00000000,?), ref: 6C71E84A
                                                    • SetRectEmpty.USER32(?), ref: 6C71E894
                                                    • MessageBeep.USER32(000000FF), ref: 6C71E912
                                                    • SendMessageW.USER32(?,00000112,?,00000000), ref: 6C71E930
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$EmptyMessage$BeepClientOffsetSend
                                                    • String ID:
                                                    • API String ID: 1287518723-0
                                                    • Opcode ID: 0b5d0d268451b80fa08af22ae1e29be14acb7b9fda3719625df3d1c66b650c2b
                                                    • Instruction ID: 04447bf827289d8bd014dc2db265da98605ef09ebc0a39ea0ec28e9b192ece7a
                                                    • Opcode Fuzzy Hash: 0b5d0d268451b80fa08af22ae1e29be14acb7b9fda3719625df3d1c66b650c2b
                                                    • Instruction Fuzzy Hash: F3717D71E04619DFDF11CFA5C688AEEB7B5EF09314F14017AE811BBA40DB71A904CBA1
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C82EC5D
                                                    • GetDC.USER32(?), ref: 6C82ED9E
                                                      • Part of subcall function 6C7854EE: __EH_prolog3.LIBCMT ref: 6C7854F5
                                                    • ReleaseDC.USER32(?,00000000), ref: 6C82EE08
                                                    • GetDeviceCaps.GDI32(?,00000058), ref: 6C82EE2F
                                                    • GetDeviceCaps.GDI32(?,0000005A), ref: 6C82EE43
                                                    • ShowScrollBar.USER32(?,00000001,00000000,00000001,00000001,00000001,6C8CA808,6C8CA808), ref: 6C82EEFC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$H_prolog3H_prolog3_ReleaseScrollShow
                                                    • String ID:
                                                    • API String ID: 3992271784-0
                                                    • Opcode ID: 07032b2db19be51762a0a17b1cd9bdb04e72df1e64f1530478c06b429d63304d
                                                    • Instruction ID: c838d0bf352b62aefa9b8d7e2987593b21ef3500f137a413b3e197b733e21f6f
                                                    • Opcode Fuzzy Hash: 07032b2db19be51762a0a17b1cd9bdb04e72df1e64f1530478c06b429d63304d
                                                    • Instruction Fuzzy Hash: 4A911374B01210DFDB14CF68C988BA97BB1FF49315F1541B9ED0AAB3A5CB34A801CBA5
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7FC95E
                                                    • CoTaskMemFree.OLE32(?,000000FF), ref: 6C7FCA97
                                                    • GetParent.USER32(?), ref: 6C7FCAFD
                                                    • SendMessageW.USER32(?,00000464,00000104,00000000), ref: 6C7FCB26
                                                    • GetParent.USER32(?), ref: 6C7FCB4C
                                                    • SendMessageW.USER32(?,00000465,00000104,00000000), ref: 6C7FCB72
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageParentSend$FreeH_prolog3Task
                                                    • String ID:
                                                    • API String ID: 526180827-0
                                                    • Opcode ID: 5827587486c7f497e996f22c77e2e4f120f03585b3fea161e7a1fcc7e3bc38ac
                                                    • Instruction ID: 6f18debf6228e702f8823c736330193c5fe9aee2cfc7108d23a15b33a7fe1c58
                                                    • Opcode Fuzzy Hash: 5827587486c7f497e996f22c77e2e4f120f03585b3fea161e7a1fcc7e3bc38ac
                                                    • Instruction Fuzzy Hash: 8D618F71B0011AEFCB14EFA4CD88DBEB7B4BF09759B140168E522A7B90DB30AD05CB95
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Delete$H_prolog3
                                                    • String ID: }tl
                                                    • API String ID: 487261545-3523746464
                                                    • Opcode ID: 911886cadc22c49729b2ba4a3e91a05eac2266823a8f7d6b27e25e1006f0821b
                                                    • Instruction ID: 8e4c48b310a1000dafd0605dcb42a92452dca8be35198394573e3b9d8b411be1
                                                    • Opcode Fuzzy Hash: 911886cadc22c49729b2ba4a3e91a05eac2266823a8f7d6b27e25e1006f0821b
                                                    • Instruction Fuzzy Hash: 37120470D007198FDB25CFA9C990A9EFBB5BF09304F10866AD459BB650EB70AA85CF50
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6C84E97E
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6C84E9E9
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C84EA06
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,6C6E3845,C8B8FD39,00000000,00000000,00000000), ref: 6C84EA45
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6C84EAA4
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,6C6E3845,C8B8FD39,00000000,00000000), ref: 6C84EAC7
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiStringWide
                                                    • String ID:
                                                    • API String ID: 2829165498-0
                                                    • Opcode ID: eb8d21cfbf1375ec2c369d3cf259a2807547f2783a0c1d068ce0bdd230c5226e
                                                    • Instruction ID: becba6090302ff7008d15fdd1ca48fb421a0d11a3ac88f3a4b8c08f8bda4786b
                                                    • Opcode Fuzzy Hash: eb8d21cfbf1375ec2c369d3cf259a2807547f2783a0c1d068ce0bdd230c5226e
                                                    • Instruction Fuzzy Hash: 0B51A47260111EAFEF20CE54CD44FABBAB9FB56758F208835F924A6590D774D804CBD0
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000017), ref: 6C714DED
                                                    • GetAsyncKeyState.USER32(00000001), ref: 6C714DFC
                                                    • WindowFromPoint.USER32(?,?), ref: 6C714E35
                                                    • ScreenToClient.USER32(?,?), ref: 6C714E83
                                                    • SendMessageW.USER32(?,?,?,00000000), ref: 6C714EF6
                                                    • ScreenToClient.USER32(?,?), ref: 6C714F63
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientScreen$AsyncFromMessageMetricsPointSendStateSystemWindow
                                                    • String ID:
                                                    • API String ID: 1550688781-0
                                                    • Opcode ID: a8612b76ad56f14269f75f5d800d879143534878f998fe2bbda668b05fb815c6
                                                    • Instruction ID: 26029d8909aae22ad35e2356111fe0b12cf016d83e8cd7dc3657998a231ff071
                                                    • Opcode Fuzzy Hash: a8612b76ad56f14269f75f5d800d879143534878f998fe2bbda668b05fb815c6
                                                    • Instruction Fuzzy Hash: 43618D71A0861ADFCF05CF64C944AAEB7B9FF48308F18422DE906A7B50DB30E951DB90
                                                    APIs
                                                    • IsWindow.USER32(?), ref: 6C70BB4C
                                                    • GetWindowRect.USER32(?,?), ref: 6C70BB96
                                                    • GetWindowRect.USER32(?,?), ref: 6C70BBC8
                                                    • OffsetRect.USER32(?,?,?), ref: 6C70BC3F
                                                    • OffsetRect.USER32(?,?,?), ref: 6C70BC4F
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 6C70BCB2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow$Offset
                                                    • String ID:
                                                    • API String ID: 1579746580-0
                                                    • Opcode ID: f735ff607997f5271e28cc62206f3aaf3f27dda713f5fa4f7a50507b9b12b9ba
                                                    • Instruction ID: be3ddeff4ad61919562fbcf93ed37c955769586cda2aac8f0fb914990c08ed24
                                                    • Opcode Fuzzy Hash: f735ff607997f5271e28cc62206f3aaf3f27dda713f5fa4f7a50507b9b12b9ba
                                                    • Instruction Fuzzy Hash: 5C51FA75A002199FCF01DFA4CA98EEEBBB9FF49314F140169E905B7250DB31AE54CBA1
                                                    APIs
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C75FC62
                                                    • IsWindow.USER32(?), ref: 6C75FCDD
                                                    • ClientToScreen.USER32(?,?), ref: 6C75FCEE
                                                    • IsWindow.USER32(?), ref: 6C75FD0C
                                                    • ClientToScreen.USER32(?,?), ref: 6C75FD3C
                                                    • SendMessageW.USER32(?,0000020A,?,?), ref: 6C75FD9A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientMessageScreenSendWindow
                                                    • String ID:
                                                    • API String ID: 2093367132-0
                                                    • Opcode ID: c2a648e98d9b55c949a63ea8659d1e4e1c9119f5df14dda3f75430cb27caa588
                                                    • Instruction ID: 271da6471d7b628417dfa99facf27fb1e5d431685450ca154c3e32bdecd6ed6a
                                                    • Opcode Fuzzy Hash: c2a648e98d9b55c949a63ea8659d1e4e1c9119f5df14dda3f75430cb27caa588
                                                    • Instruction Fuzzy Hash: 2841E335601A06AADB114F78CB9CB7A7BB5EF05388FE00578E8A1D6EA4DF31D970C640
                                                    APIs
                                                    • PtInRect.USER32(?,?,?), ref: 6C7079E3
                                                    • PtInRect.USER32(?,?,?), ref: 6C7079FB
                                                    • GetWindowRect.USER32(?,?), ref: 6C707A21
                                                    • PtInRect.USER32(?,?,?), ref: 6C707A64
                                                    • InflateRect.USER32(?,?,?), ref: 6C707A7A
                                                    • PtInRect.USER32(?,?,?), ref: 6C707A8A
                                                      • Part of subcall function 6C70681F: __EH_prolog3.LIBCMT ref: 6C706826
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$H_prolog3InflateWindow
                                                    • String ID:
                                                    • API String ID: 1292614506-0
                                                    • Opcode ID: befa80f1d2eac8647d66c39cc0ffa18055c5f5d2be5e503fd1826ade1b41828f
                                                    • Instruction ID: c1f0ce89d0fa1a54809de08114b99e4570078373a57bbb10e21c6530068dc138
                                                    • Opcode Fuzzy Hash: befa80f1d2eac8647d66c39cc0ffa18055c5f5d2be5e503fd1826ade1b41828f
                                                    • Instruction Fuzzy Hash: 74515FB1B00219AFCF01CF68C989AEDBBF9FF49354F244129E815E7290DB309A50CB51
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C77E49B
                                                      • Part of subcall function 6C7C17CE: __EH_prolog3_catch.LIBCMT ref: 6C7C17D5
                                                    • WSAStartup.WS2_32(00000101,?), ref: 6C77E4E0
                                                    • WSACleanup.WS2_32 ref: 6C77E52F
                                                    • WSASetLastError.WS2_32(0000276C), ref: 6C77E53A
                                                    • WSACleanup.WS2_32 ref: 6C77E5DA
                                                    • FreeLibrary.KERNEL32(?,6C77E5F5,?,6C77E5F5,00000198,6C6FC118,00000000), ref: 6C77E5E3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Cleanup$ErrorFreeH_prolog3_H_prolog3_catchLastLibraryStartup
                                                    • String ID:
                                                    • API String ID: 2958719020-0
                                                    • Opcode ID: 7999bf07fc78eb96019df8ed8a090d807060d14b62e5f1301f3cc6904ca002e3
                                                    • Instruction ID: 3229404b1a89459845af94eaf3a517f86e64bb133e94f71fc14bf46f9a9dc8a7
                                                    • Opcode Fuzzy Hash: 7999bf07fc78eb96019df8ed8a090d807060d14b62e5f1301f3cc6904ca002e3
                                                    • Instruction Fuzzy Hash: 9F415870B4131E9FEF309F758B0C7C9BAB0AF02758F108579A4559AE80EB70C954CBA2
                                                    APIs
                                                    • GetFocus.USER32 ref: 6C7FC83C
                                                      • Part of subcall function 6C75D911: UnhookWindowsHookEx.USER32(?), ref: 6C75D93B
                                                    • IsWindowEnabled.USER32(00000000), ref: 6C7FC872
                                                    • EnableWindow.USER32(00000000,00000000), ref: 6C7FC88A
                                                    • EnableWindow.USER32(00000000,00000001), ref: 6C7FC92B
                                                    • IsWindow.USER32(00000000), ref: 6C7FC932
                                                    • SetFocus.USER32(00000000), ref: 6C7FC93D
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableFocus$EnabledHookUnhookWindows
                                                    • String ID:
                                                    • API String ID: 2931672367-0
                                                    • Opcode ID: dc4e24888ab0b63ecfb6bf485b790555dd3eac0a0fd504c4f3986bf4a8e20bd4
                                                    • Instruction ID: 8336319a305ddc732f5c3e498c2cb8609806b10e3263041b27100139012f9f19
                                                    • Opcode Fuzzy Hash: dc4e24888ab0b63ecfb6bf485b790555dd3eac0a0fd504c4f3986bf4a8e20bd4
                                                    • Instruction Fuzzy Hash: 83418E30701601EFDB14EF68CA89F99BBB5FF45319F108169E0298B750CB70A856CB92
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C71AF3A
                                                      • Part of subcall function 6C77814E: __EH_prolog3.LIBCMT ref: 6C778155
                                                      • Part of subcall function 6C77814E: SetRectEmpty.USER32 ref: 6C77823F
                                                      • Part of subcall function 6C77814E: SetRectEmpty.USER32(?), ref: 6C77826A
                                                      • Part of subcall function 6C742BD7: __EH_prolog3.LIBCMT ref: 6C742BDE
                                                    • SetRectEmpty.USER32(?), ref: 6C71B0A5
                                                    • SetRectEmpty.USER32(?), ref: 6C71B0B4
                                                    • SetRectEmpty.USER32(?), ref: 6C71B0BB
                                                    • SetRectEmpty.USER32(?), ref: 6C71B0C2
                                                    • SetRectEmpty.USER32(?), ref: 6C71B0EC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3
                                                    • String ID:
                                                    • API String ID: 3752103406-0
                                                    • Opcode ID: 51b6412a39f1ca8ed5ff7f52083cb7dca4e8d4e5f46dbd891f8bc710b363fb34
                                                    • Instruction ID: 17445779b999ced53a3cf50aaee276422301ff0b212371d36e983cacd4b6a2a5
                                                    • Opcode Fuzzy Hash: 51b6412a39f1ca8ed5ff7f52083cb7dca4e8d4e5f46dbd891f8bc710b363fb34
                                                    • Instruction Fuzzy Hash: 3F51B2F09016018FC754CF29C588699BBE4BF89318F2885BED65DDF222EB729506CF19
                                                    APIs
                                                    • KillTimer.USER32(?,?), ref: 6C70A3E1
                                                    • KillTimer.USER32(?,?), ref: 6C70A44C
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 6C70A474
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000001), ref: 6C70A484
                                                    • KillTimer.USER32(?,?), ref: 6C70A498
                                                    • SetTimer.USER32(?,0000EC03,00000000), ref: 6C70A4AD
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Timer$Kill$RedrawWindow
                                                    • String ID:
                                                    • API String ID: 777020489-0
                                                    • Opcode ID: dd7dad3c4f20c8ada9b123d329159da4fad8af95be8da858c779349efc04687d
                                                    • Instruction ID: 8cb4fd36ae82aabbaad210669f77c150c8a971346fd3344ea49ca0b51c66c34e
                                                    • Opcode Fuzzy Hash: dd7dad3c4f20c8ada9b123d329159da4fad8af95be8da858c779349efc04687d
                                                    • Instruction Fuzzy Hash: 8D31B0B1711506AFDB0A8F29CA4CA69BBFAFB48355F104138F429D3A50CB309D21DB90
                                                    APIs
                                                    • lstrcmpiW.KERNEL32(00000000,00000000,?,?,00000000), ref: 6C7DBFBF
                                                    • GetSystemMetrics.USER32(0000002A), ref: 6C7DBFCF
                                                    • GetThreadLocale.KERNEL32(?,00000000), ref: 6C7DC001
                                                    • GetStringTypeExW.KERNEL32(00000000,00000001,00000000,000000FF,?,?,00000000), ref: 6C7DC016
                                                    • GetStringTypeExW.KERNEL32(00000000,00000004,00000000,000000FF,?,?,00000000), ref: 6C7DC029
                                                    • GetStringTypeExW.KERNEL32(00000000,00000001,00000000,000000FF,?,?,00000000), ref: 6C7DC03C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: StringType$LocaleMetricsSystemThreadlstrcmpi
                                                    • String ID:
                                                    • API String ID: 1041732273-0
                                                    • Opcode ID: 6469d3f57869062f9f3f5174e1f584942dcadb9ee1b2f0eae7e781a9a1043a0d
                                                    • Instruction ID: 414594cd01ce64df1b3ca9321759379a201e339a6dde365622a9a3190526ed55
                                                    • Opcode Fuzzy Hash: 6469d3f57869062f9f3f5174e1f584942dcadb9ee1b2f0eae7e781a9a1043a0d
                                                    • Instruction Fuzzy Hash: 8221087170410AABDB20AB398D48EAB337DEB47769F254274F531D35C0EA70A941CB61
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,?,?,6C74774C,?,0000000E), ref: 6C7DBAFB
                                                    • GetLastError.KERNEL32(?,6C74774C,?,0000000E), ref: 6C7DBB1A
                                                    • LockFile.KERNEL32(00000005,?,00000000,?,?,00000000,?,0000000D,000000FF,00000000,00000000,00000000,?,6C74774C,?,0000000E), ref: 6C7DBB4F
                                                    • GetLastError.KERNEL32(?,0000000D,000000FF,00000000,00000000,00000000,?,6C74774C,?,0000000E), ref: 6C7DBB68
                                                    • UnlockFile.KERNEL32(00000005,?,00000000,?,?,00000000,?,00000000,00000000,?,0000000D,000000FF,00000000,00000000,00000000), ref: 6C7DBB8B
                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,0000000D,000000FF,00000000,00000000,00000000,?,6C74774C,?,0000000E), ref: 6C7DBBA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast$LockUnlockWrite
                                                    • String ID:
                                                    • API String ID: 336088143-0
                                                    • Opcode ID: cf2da671af0ba45765557a4cb819eb759fafb36ffef9d3862bac621fd5c31d62
                                                    • Instruction ID: 271ecdd4890177d382d0e4a2498fe17c84480012ffa2655fc9157c6356f9d7c0
                                                    • Opcode Fuzzy Hash: cf2da671af0ba45765557a4cb819eb759fafb36ffef9d3862bac621fd5c31d62
                                                    • Instruction Fuzzy Hash: 6F219C32501219BBCF209EA1ED0CDDA7B6CEF012A4F018525F92986950DB71F920E7E0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7E74AD
                                                    • GetMenuItemCount.USER32(?), ref: 6C7E74D3
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C7E74EA
                                                    • GetMenuState.USER32(?,00000000,00000400), ref: 6C7E7502
                                                    • GetSubMenu.USER32(?,00000000), ref: 6C7E7575
                                                      • Part of subcall function 6C77F2AF: GetMenuStringW.USER32(0000000D,0000000F,00000000,00000000,?), ref: 6C77F2C3
                                                      • Part of subcall function 6C77F2AF: GetMenuStringW.USER32(0000000D,0000000F,00000000,00000001,?), ref: 6C77F2E7
                                                      • Part of subcall function 6C7E760B: __EH_prolog3.LIBCMT ref: 6C7E7612
                                                    • ModifyMenuW.USER32(?,00000000,00000400,00000000,?), ref: 6C7E755C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$H_prolog3ItemString$CountModifyState
                                                    • String ID:
                                                    • API String ID: 2436308985-0
                                                    • Opcode ID: bdda5418b7db805ca8572bdccedd23724580172e2276f60acdd3e3a60b451f9f
                                                    • Instruction ID: 11d03d001939cb290f08756a6d674403bd7224e9933105f6fa5a1cbb1fec7455
                                                    • Opcode Fuzzy Hash: bdda5418b7db805ca8572bdccedd23724580172e2276f60acdd3e3a60b451f9f
                                                    • Instruction Fuzzy Hash: 9F218D71601116ABDF119BA4CE0CFEEBA75BF0935CF108138E135AAAA1DB30D958CB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71E126
                                                      • Part of subcall function 6C702C90: __EH_prolog3.LIBCMT ref: 6C702C97
                                                      • Part of subcall function 6C702C90: GetWindowDC.USER32(00000000,00000004,6C7613FB,00000000), ref: 6C702CC3
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 6C71E148
                                                    • GetSystemMetrics.USER32(00000036), ref: 6C71E159
                                                    • GetSystemMetrics.USER32(00000036), ref: 6C71E163
                                                    • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 6C71E17F
                                                      • Part of subcall function 6C702A7E: SelectObject.GDI32(?,!+pl), ref: 6C702A87
                                                    • DrawFrameControl.USER32(?,?,00000001,00002000), ref: 6C71E1B8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreateMetricsSystem$BitmapControlDrawFrameH_prolog3H_prolog3_ObjectSelectWindow
                                                    • String ID:
                                                    • API String ID: 3758044866-0
                                                    • Opcode ID: 436a744d8c6662adf75f2a38ffb46134db503ba2148db8f007738601c6ddd896
                                                    • Instruction ID: 24bd675e42a9842ed617995a1e97e6736cc300a9a3e0c131264aa9830727515f
                                                    • Opcode Fuzzy Hash: 436a744d8c6662adf75f2a38ffb46134db503ba2148db8f007738601c6ddd896
                                                    • Instruction Fuzzy Hash: 08211CB2E00209AFDF11DFE4DA4DADEBBB4BF08344F108029E911B7650DB715A45CBA5
                                                    APIs
                                                      • Part of subcall function 6C7212F9: IsWindow.USER32(?), ref: 6C721305
                                                    • SendMessageW.USER32(00000020,0000020A,?,?), ref: 6C76BE49
                                                    • GetFocus.USER32 ref: 6C76BE67
                                                    • IsChild.USER32(00000020,?), ref: 6C76BE84
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C76BE9E
                                                    • IsWindowVisible.USER32(?), ref: 6C76BEB7
                                                    • SendMessageW.USER32(?,0000020A,?,?), ref: 6C76BED5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$ChildFocusVisible
                                                    • String ID:
                                                    • API String ID: 1252167185-0
                                                    • Opcode ID: 3d0f017926c19281f92cb6ea8b02cc6c25ffe909ac71384c9f5c7b76ca8d3474
                                                    • Instruction ID: 96777352fe3cba80f4ec58df0f18c64daadaee2be8045698ae0d5f0f7bc1445e
                                                    • Opcode Fuzzy Hash: 3d0f017926c19281f92cb6ea8b02cc6c25ffe909ac71384c9f5c7b76ca8d3474
                                                    • Instruction Fuzzy Hash: 4E21BE31240206ABDB215F26C908F5A7BB9BF0A799F104075FA659BD60DB71E810EB91
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C719BA6
                                                    • GetDesktopWindow.USER32 ref: 6C719BB4
                                                      • Part of subcall function 6C702C90: __EH_prolog3.LIBCMT ref: 6C702C97
                                                      • Part of subcall function 6C702C90: GetWindowDC.USER32(00000000,00000004,6C7613FB,00000000), ref: 6C702CC3
                                                    • SetRectEmpty.USER32(?), ref: 6C719BD8
                                                    • SetRectEmpty.USER32(?), ref: 6C719BE9
                                                    • CopyRect.USER32(?,?), ref: 6C719BF8
                                                    • CopyRect.USER32(?,?), ref: 6C719C14
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$CopyEmptyWindow$DesktopH_prolog3H_prolog3_
                                                    • String ID:
                                                    • API String ID: 2526268198-0
                                                    • Opcode ID: db232de8f66b20670b9a6cbd024f142efa7d8fee4ee724e73f169275c3dd5855
                                                    • Instruction ID: 6e160841c680ef2fc392f6abfc4c30ca47c8f320f5a1cfea2355ef5d08eaf409
                                                    • Opcode Fuzzy Hash: db232de8f66b20670b9a6cbd024f142efa7d8fee4ee724e73f169275c3dd5855
                                                    • Instruction Fuzzy Hash: E4214DB2E10628ABCF11DFA0DD48EDEB779BF15308F144125F901BB500DB70AA4ACB90
                                                    APIs
                                                    • LoadMenuW.USER32(?,?), ref: 6C7DD577
                                                    • LoadAcceleratorsW.USER32(?,?), ref: 6C7DD586
                                                    • LoadMenuW.USER32(?,?), ref: 6C7DD5A7
                                                    • LoadAcceleratorsW.USER32(?,?), ref: 6C7DD5B6
                                                    • LoadMenuW.USER32(?,?), ref: 6C7DD5D7
                                                    • LoadAcceleratorsW.USER32(?,?), ref: 6C7DD5E6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Load$AcceleratorsMenu
                                                    • String ID:
                                                    • API String ID: 144087665-0
                                                    • Opcode ID: 05963802d7b8afa5349f1f8b02688fc980f5d58fa5eb15a171219f5592b94d72
                                                    • Instruction ID: 5c00a1bdbbf8ba279288912483a51963526c4de684d9ff3d45d8026857da0d76
                                                    • Opcode Fuzzy Hash: 05963802d7b8afa5349f1f8b02688fc980f5d58fa5eb15a171219f5592b94d72
                                                    • Instruction Fuzzy Hash: 6B21F9B5501A66EFD7609FA6D5489B5B7B8FF0931E305803BEA1182A00D734B864CFE6
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,6C882579,6C882D87,?,00000002,?,?,6C86C985,?,?,00000002,?,?,00000000,00000000), ref: 6C882590
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C88259E
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C8825B7
                                                    • SetLastError.KERNEL32(00000000,6C86C985,?,?,00000002,?,?,00000000,00000000,00000000,?,00000002,?), ref: 6C882609
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: b0b08748a522fdf1c3b2b9be38afd14b745cc6760433fa23a62037dc10ce9791
                                                    • Instruction ID: 34ccbb9ee0da6db67e1e5f32ce6013ec0650ede7d1e18fa1e0f24994b45f9c6d
                                                    • Opcode Fuzzy Hash: b0b08748a522fdf1c3b2b9be38afd14b745cc6760433fa23a62037dc10ce9791
                                                    • Instruction Fuzzy Hash: 0A01D23234F2175EAB70297A6E98A8A2BB4EB02279330073DE22052ED1EF554C1557D0
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 6C7638F0
                                                    • GetWindow.USER32(00000000), ref: 6C7638F7
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 6C763925
                                                    • ShowWindow.USER32(00000000,00000000,?,?,6C763DB1,00000001), ref: 6C763940
                                                    • ShowWindow.USER32(00000000,00000004,?,?,6C763DB1,00000001), ref: 6C763961
                                                    • GetWindow.USER32(00000000,00000002), ref: 6C76396E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$DesktopLong
                                                    • String ID:
                                                    • API String ID: 3178490500-0
                                                    • Opcode ID: 6e921e961f4f9aa24e78e5c063df7e6b7687b0f9d4be83a31e5b54881b34395c
                                                    • Instruction ID: 1ff781d932adc2f411dde7b711870a0ec226aa80cbf69ae825ed650abc334c28
                                                    • Opcode Fuzzy Hash: 6e921e961f4f9aa24e78e5c063df7e6b7687b0f9d4be83a31e5b54881b34395c
                                                    • Instruction Fuzzy Hash: 24117331606F1567E72157279A09B8A7D78EF03BAEF140235FD22B7D84DB24C850CAD5
                                                    APIs
                                                    • GetFocus.USER32 ref: 6C7C0ACA
                                                      • Part of subcall function 6C7C0B66: GetWindowLongW.USER32(?,000000F0), ref: 6C7C0B81
                                                      • Part of subcall function 6C7C0B66: GetClassNameW.USER32(?,?,0000000A), ref: 6C7C0B96
                                                      • Part of subcall function 6C7C0B66: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,?,?,00000000,?,00000000,00000004,6C735CCC,00000004,6C6D54D9), ref: 6C7C0BAD
                                                    • GetParent.USER32(00000000), ref: 6C7C0AEB
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 6C7C0B0A
                                                    • GetParent.USER32(00000000), ref: 6C7C0B18
                                                    • GetDesktopWindow.USER32 ref: 6C7C0B20
                                                    • SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 6C7C0B34
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
                                                    • String ID:
                                                    • API String ID: 1233893325-0
                                                    • Opcode ID: be5cf943148cacc2bc73356c777c00fd8534919933da597b42c85412534c9b56
                                                    • Instruction ID: 115f16c803fab26f9ce3b73d6cfc2aca70548d19689894100b85b16a4a9c34f9
                                                    • Opcode Fuzzy Hash: be5cf943148cacc2bc73356c777c00fd8534919933da597b42c85412534c9b56
                                                    • Instruction Fuzzy Hash: C4F086B23016527BD6126B245D48F6E316D6B76F9EF310134F921A3AC49F24C941C5D7
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C7203ED
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CtrlH_prolog3H_prolog3_catch
                                                    • String ID: %TsMFCOutlookBar-%d$%TsMFCOutlookBar-%d%x$MFCOutlookBars$MFCOutlookCustomPages
                                                    • API String ID: 905329913-3944741965
                                                    • Opcode ID: 6306f59d721ae88ec102cbbd4eaf70503b7a8c12c8244afb996257d15c8bdfcd
                                                    • Instruction ID: bda3cdbdf678572bc0999f429e32ac67cba3be3cf4239806f94256f135f9d98d
                                                    • Opcode Fuzzy Hash: 6306f59d721ae88ec102cbbd4eaf70503b7a8c12c8244afb996257d15c8bdfcd
                                                    • Instruction Fuzzy Hash: 6BA13971E00259DFCF04DFA4CA98AEDBBB5BF09318F140169E516A7790DB34AE09CB60
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C73869B
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CtrlH_prolog3H_prolog3_catch
                                                    • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars
                                                    • API String ID: 905329913-3577816979
                                                    • Opcode ID: ee6ace745229f4d2ace333520802aa8eca0b5460457e06807b2d1af4ed72e903
                                                    • Instruction ID: 3add3bcc75dec13d1be0113c2577c8ee2ccaddeafd2301620494a1bb5100744f
                                                    • Opcode Fuzzy Hash: ee6ace745229f4d2ace333520802aa8eca0b5460457e06807b2d1af4ed72e903
                                                    • Instruction Fuzzy Hash: A4915E75A00209DFDF00DFA5CA98AEDB7B6FF89318F244069E506A7791CB31AD05CB61
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C776911
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$Ctrl
                                                    • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                                                    • API String ID: 3879667756-2169875744
                                                    • Opcode ID: 1c42221a39ce68bb608a79ce38a5b7aefa6f0b95314252623337acd81c1e5d41
                                                    • Instruction ID: e5c3df845f2b8a3a80903a02c94d94fd9a2c8126779054e7a6e3bcd12c396099
                                                    • Opcode Fuzzy Hash: 1c42221a39ce68bb608a79ce38a5b7aefa6f0b95314252623337acd81c1e5d41
                                                    • Instruction Fuzzy Hash: 5231A271A00209DFCF10DFA5CD889FEBB75BF8A318F150A68E512A7790CB309905DB61
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7767FD
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C790A0E: GetDlgCtrlID.USER32(?), ref: 6C790A19
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$Ctrl
                                                    • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                                                    • API String ID: 3879667756-2169875744
                                                    • Opcode ID: 36b2a2523e684e6a5f0613b9d88b125dc06265b8c6f346d80c4f79627941f8bf
                                                    • Instruction ID: 33a293b1e461cb5e10a477ad68a3fbfd563cd1d97e1312cbe2e400eb2fdb14ff
                                                    • Opcode Fuzzy Hash: 36b2a2523e684e6a5f0613b9d88b125dc06265b8c6f346d80c4f79627941f8bf
                                                    • Instruction Fuzzy Hash: 7F31A371E00109DFCF10DFA5CA88AEDB7B5BF49318F140568E911A7780CB319E05DB61
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Text$H_prolog3
                                                    • String ID: 4<ol
                                                    • API String ID: 1044789843-3575510533
                                                    • Opcode ID: 776de71e21146152cb91221eda31261eea3dd3f9fbf0e61f3ee198c3af05855e
                                                    • Instruction ID: 52a6bca48de9612d0d82e6c95af8a9ed6808861df6828396b70582c1b29b0f4b
                                                    • Opcode Fuzzy Hash: 776de71e21146152cb91221eda31261eea3dd3f9fbf0e61f3ee198c3af05855e
                                                    • Instruction Fuzzy Hash: D621E236700515AFCF05AF68DD48D9DB7B5BF0A328B044239E52997B60DB30E914DB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Edit
                                                    • API String ID: 0-554135844
                                                    • Opcode ID: 99cbf106f346eaf1ae8c186599e8ccbb1a2e55c85273beffbafed655745b87e7
                                                    • Instruction ID: d98a673143fd2f98ceef096a1eb9479a46d2df77edbfd21a0e72e7e4f9621c76
                                                    • Opcode Fuzzy Hash: 99cbf106f346eaf1ae8c186599e8ccbb1a2e55c85273beffbafed655745b87e7
                                                    • Instruction Fuzzy Hash: EF1186B0342201AAFE511A25EE08F6676E8AB45799F104539F561E2D90DFB0F850C799
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000003,00000000,?,6C7DB80D,?,80000000,?,0000000C,00000003,FFFF7FFF,00000000,?,00000000,?), ref: 6C7DB47F
                                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 6C7DB48F
                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000104,?,?,00000000,?,00000003,00000000,?,6C7DB80D,?,80000000,?,0000000C), ref: 6C7DB4D8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressCreateFileHandleModuleProc
                                                    • String ID: CreateFileTransactedW$kernel32.dll
                                                    • API String ID: 2580138172-2053874626
                                                    • Opcode ID: 445164d91cf2e6bcf2ee0f370d9396d1ff9585374e264f3e5cb147f42eb22cb6
                                                    • Instruction ID: f68b558201735aec99d6f52020ecdc7d74602decd5183b821e6ff5fb58927dc0
                                                    • Opcode Fuzzy Hash: 445164d91cf2e6bcf2ee0f370d9396d1ff9585374e264f3e5cb147f42eb22cb6
                                                    • Instruction Fuzzy Hash: C201E93210014EFFDF229E94DD45D9A3B7AFF4939AB118529FA3551520C732E861EB60
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C82DD23
                                                    • GetClassNameW.USER32(?,00000000,00000400), ref: 6C82DD54
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 6C82DD8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassH_prolog3LongNameWindow
                                                    • String ID: ComboBox$ComboBoxEx32
                                                    • API String ID: 297531199-1907415764
                                                    • Opcode ID: 4bb62d73c6801bb02fc138dab1e2876139341dd0651a308a166ee6c80c759f10
                                                    • Instruction ID: 12b9a44b54aa6cc47e575fe1d06325d88b98883e330af625d7bf3d6b3bf1b4da
                                                    • Opcode Fuzzy Hash: 4bb62d73c6801bb02fc138dab1e2876139341dd0651a308a166ee6c80c759f10
                                                    • Instruction Fuzzy Hash: 0701C4759011125BDB20E750CF08BEDB774BF1636DF104929E02162EC0DF34A919CBA5
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C704166
                                                      • Part of subcall function 6C7C1EDD: __EH_prolog3.LIBCMT ref: 6C7C1EE4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3
                                                    • String ID: File%d$PreviewPages$Recent File List$Settings
                                                    • API String ID: 431132790-526586445
                                                    • Opcode ID: 4485a4855a10b9fa19f5a1000bbe02ec37d6d1a71180faab1ec54c45fe91d243
                                                    • Instruction ID: 042e0a0d4507391cf3aa955b66737c3a2745c72ed00fe7b816086918a115333b
                                                    • Opcode Fuzzy Hash: 4485a4855a10b9fa19f5a1000bbe02ec37d6d1a71180faab1ec54c45fe91d243
                                                    • Instruction Fuzzy Hash: AC019270B00304AFEB149F64CA49B5C7AA16B58359F104965ED15DB7C2CB748815EB91
                                                    APIs
                                                    • FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6C8B4130,?,6C745829,?,?,?,00000038,6C742E49), ref: 6C747515
                                                    • LoadResource.KERNEL32(00000000,00000000,?,6C8B4130,?,6C745829,?,?,?,00000038,6C742E49), ref: 6C747523
                                                    • LockResource.KERNEL32(00000000,?,6C8B4130,?,6C745829,?,?,?,00000038,6C742E49), ref: 6C74752E
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,6C8B4130,?,6C745829,?,?,?,00000038,6C742E49), ref: 6C74753C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID: PNG
                                                    • API String ID: 3473537107-364855578
                                                    • Opcode ID: 71bf2927928e50c4c880043e282f90a1cc38adfc471ab78342075f5f847c31fc
                                                    • Instruction ID: cfe16aa74f4e81a8b3be8fb4a51e5f20ce0ab20c98ad4e9a9b626fb078796f6d
                                                    • Opcode Fuzzy Hash: 71bf2927928e50c4c880043e282f90a1cc38adfc471ab78342075f5f847c31fc
                                                    • Instruction Fuzzy Hash: B7F0C236611159BBEB216FA59E0DC9FB77CDF4B2993208036F81097600DB34DA00C6F0
                                                    APIs
                                                    • DecodePointer.KERNEL32(00000000,00000000,?,6C710ADC,?,00000000,?,00000000), ref: 6C7C34AA
                                                      • Part of subcall function 6C7589EE: GetModuleHandleW.KERNEL32(kernel32.dll,00000000,00000001), ref: 6C758A14
                                                      • Part of subcall function 6C7589EE: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C758A24
                                                      • Part of subcall function 6C7589EE: EncodePointer.KERNEL32(00000000), ref: 6C758A2D
                                                    • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 6C7C3493
                                                    • EncodePointer.KERNEL32(00000000,?,6C710ADC,?,00000000,?,00000000), ref: 6C7C349C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                                    • String ID: DwmSetIconicLivePreviewBitmap$dwmapi.dll
                                                    • API String ID: 1102202064-1757063745
                                                    • Opcode ID: ca2876201d9f7e6ebadffee4fb1595acb79a106dc53154a7d03557931898bb22
                                                    • Instruction ID: 6849ee6e180336917de9f944d8203d3d9ad21885d8c93e5dc202c3890e994a9d
                                                    • Opcode Fuzzy Hash: ca2876201d9f7e6ebadffee4fb1595acb79a106dc53154a7d03557931898bb22
                                                    • Instruction Fuzzy Hash: 34F0BB3674511BAF8F125F65EE0DC9D3B79AB0A3A53104435FC29D7A10DB38C950DAE1
                                                    APIs
                                                    • DecodePointer.KERNEL32(00000000,?,?,6C711464,00000450,?,00000000,?,6C716CC3), ref: 6C7C344E
                                                      • Part of subcall function 6C7589EE: GetModuleHandleW.KERNEL32(kernel32.dll,00000000,00000001), ref: 6C758A14
                                                      • Part of subcall function 6C7589EE: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C758A24
                                                      • Part of subcall function 6C7589EE: EncodePointer.KERNEL32(00000000), ref: 6C758A2D
                                                    • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 6C7C3437
                                                    • EncodePointer.KERNEL32(00000000,?,6C711464,00000450,?,00000000,?,6C716CC3,?,?,?,?,?,?,?,6C719B63), ref: 6C7C3440
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                                    • String ID: DwmInvalidateIconicBitmaps$dwmapi.dll
                                                    • API String ID: 1102202064-1901905683
                                                    • Opcode ID: b471d7a6cbe9f48f758a5d5e2424fcd8460628a2daf6c48ffae06b33d741b6d3
                                                    • Instruction ID: acc051c63f5c3f388ac4699726090cc632aa5c4f0c444556fbf99646031aeff6
                                                    • Opcode Fuzzy Hash: b471d7a6cbe9f48f758a5d5e2424fcd8460628a2daf6c48ffae06b33d741b6d3
                                                    • Instruction Fuzzy Hash: BCF0AE75B05617AF4B122B689D0DC6D3B786B0B7E93114435FC15D7F00DB28C900D9E2
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$H_prolog3Visible
                                                    • String ID:
                                                    • API String ID: 3969123015-0
                                                    • Opcode ID: f5cf21946c7640d799f8b5b537d47c7d67ea34ab4b3e994f9d9a2c2ed20402e8
                                                    • Instruction ID: 2fcd42fbbb094c104e568e36511913a2d58e39ae70841b0a45bf38c5052a4aac
                                                    • Opcode Fuzzy Hash: f5cf21946c7640d799f8b5b537d47c7d67ea34ab4b3e994f9d9a2c2ed20402e8
                                                    • Instruction Fuzzy Hash: CAF18F75B052159FCF05DB65CA98AED7BB6BF88354F280069EC12A7B80DF34AD01CB91
                                                    APIs
                                                    • SetRectEmpty.USER32(?), ref: 6C73D94C
                                                    • SetRectEmpty.USER32(?), ref: 6C73D9D7
                                                    • SetRectEmpty.USER32(?), ref: 6C73DBF7
                                                    • GetClientRect.USER32(8524E8CF,?), ref: 6C73DC54
                                                    • GetClientRect.USER32(8524E8CF,?), ref: 6C73DC6A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty$Client
                                                    • String ID:
                                                    • API String ID: 1457177775-0
                                                    • Opcode ID: abb3ce533fb71d5ccd23b942736fe7a2c5aa60f1b72ddd8d359dfaafa20a43d7
                                                    • Instruction ID: dcc6ef5e1536598d3150d7c7a9c7ca8c0ff4c7d4a2380d77bc2711f12a471535
                                                    • Opcode Fuzzy Hash: abb3ce533fb71d5ccd23b942736fe7a2c5aa60f1b72ddd8d359dfaafa20a43d7
                                                    • Instruction Fuzzy Hash: 21D17871E10629CFCF05CFA8C684ADEB7F2BF49304F244169E819BB641D771A946CBA4
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71D5EF
                                                    • GetFocus.USER32 ref: 6C71D607
                                                      • Part of subcall function 6C75913E: GetParent.USER32(?), ref: 6C75916A
                                                      • Part of subcall function 6C790D49: GetParent.USER32(?), ref: 6C790D57
                                                      • Part of subcall function 6C790D49: GetParent.USER32(?), ref: 6C790D6A
                                                      • Part of subcall function 6C790D49: GetParent.USER32(?), ref: 6C790D84
                                                      • Part of subcall function 6C790D49: SetFocus.USER32(?,00000000,?,6C6D1C04,?), ref: 6C790D9D
                                                    • GetMenuItemCount.USER32(?), ref: 6C71D760
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C71D780
                                                      • Part of subcall function 6C7E73BA: __EH_prolog3.LIBCMT ref: 6C7E73C1
                                                    • GetSubMenu.USER32(00000000,00000000), ref: 6C71D810
                                                      • Part of subcall function 6C7E765E: __EH_prolog3.LIBCMT ref: 6C7E7665
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$Menu$FocusH_prolog3Item$CountH_prolog3_
                                                    • String ID:
                                                    • API String ID: 3488410442-0
                                                    • Opcode ID: 569194131be79a902d46469ce5f3e6c14c4a303873da76ded9f8cec93512b78d
                                                    • Instruction ID: ff548492aff8918ecbfec4fc97516e592059941c54ab84e2b6f01139e5b7e872
                                                    • Opcode Fuzzy Hash: 569194131be79a902d46469ce5f3e6c14c4a303873da76ded9f8cec93512b78d
                                                    • Instruction Fuzzy Hash: 23B1A230A046249FCF119F64CD5DBED7B75AF49318F1841BAE81AABA81CF30A944CF94
                                                    APIs
                                                      • Part of subcall function 6C75913E: GetParent.USER32(?), ref: 6C75916A
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C718D35
                                                    • IsWindow.USER32(?), ref: 6C718FDF
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C71900C
                                                    • GetParent.USER32(?), ref: 6C719015
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 6C71902D
                                                      • Part of subcall function 6C71636E: GetClientRect.USER32(?,?), ref: 6C7163FF
                                                      • Part of subcall function 6C71636E: IsRectEmpty.USER32(?), ref: 6C716409
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageParentRectSendWindow$ClientEmptyRedraw
                                                    • String ID:
                                                    • API String ID: 1906000866-0
                                                    • Opcode ID: 27f6b40778a47d354be1c4f720e9d0c73c2833a2c4017bed9f0e97df189741bb
                                                    • Instruction ID: 746fa7e77727f7da3f772ec1bf0a62d694ce4d62f7b989fdd659238d8c91fa17
                                                    • Opcode Fuzzy Hash: 27f6b40778a47d354be1c4f720e9d0c73c2833a2c4017bed9f0e97df189741bb
                                                    • Instruction Fuzzy Hash: C3A18C74B04215DFCF05DB25C959BAD7BB6BF89744F29006AE816EBB80DB34A901CF90
                                                    APIs
                                                    • LockWindowUpdate.USER32(?), ref: 6C707FCB
                                                    • IsWindow.USER32(?), ref: 6C707FFA
                                                    • GetWindowRect.USER32(?,?), ref: 6C708067
                                                    • CopyRect.USER32(?,?), ref: 6C7081FC
                                                    • LockWindowUpdate.USER32(00000000,?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 6C708231
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$LockRectUpdate$Copy
                                                    • String ID:
                                                    • API String ID: 2992910783-0
                                                    • Opcode ID: beeb5578b68e1945e10bb6c21f9b6b9f49fb6f1b7d304cd2e91eb2ac2b2227b7
                                                    • Instruction ID: 7b956f7e88d41488230cd328af9100f1862d5e89e0c0e974ca26b483e2c8be6f
                                                    • Opcode Fuzzy Hash: beeb5578b68e1945e10bb6c21f9b6b9f49fb6f1b7d304cd2e91eb2ac2b2227b7
                                                    • Instruction Fuzzy Hash: 92914B75B002189FCF04DF69C999AAE7BB9FF89750F15016AE806EB341CB34AD01CB91
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C708AA4
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow
                                                    • String ID:
                                                    • API String ID: 861336768-0
                                                    • Opcode ID: ac2e9d7e76e54d25897fa7af681217c09992a2416ba32c664380a4f1c254a9cd
                                                    • Instruction ID: c23642b48f47751a8f42ee498d7f1bce633930e4b05056af8126ff0168f1d69e
                                                    • Opcode Fuzzy Hash: ac2e9d7e76e54d25897fa7af681217c09992a2416ba32c664380a4f1c254a9cd
                                                    • Instruction Fuzzy Hash: 668149B4B002159FCF05DB65C999ABEBBBAFF49344F1400AAE906E7790DB346D01CB91
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C82B549
                                                    • StringFromCLSID.OLE32(00000000,?,00000018,6C82AE78,00000000,?,00000000,00000001,00000000,?,?,?,0000000A,00000008,6C755E76,?), ref: 6C82B557
                                                    • CoTaskMemFree.OLE32(?,00000001,00000001,00000000,?,?,?,?,?), ref: 6C82B589
                                                      • Part of subcall function 6C7DBEB6: GetModuleFileNameW.KERNEL32(?,?,00000104,?), ref: 6C7DBEDD
                                                      • Part of subcall function 6C703759: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,00000000,?,?,?,6C70374F,?,?,00000000,00000004), ref: 6C703788
                                                      • Part of subcall function 6C82AD9D: __EH_prolog3.LIBCMT ref: 6C82ADA4
                                                    • ExtractIconW.SHELL32(?,?,?), ref: 6C82B635
                                                    • DestroyCursor.USER32(00000000), ref: 6C82B640
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$ByteCharCursorDestroyExtractFileFreeFromIconModuleMultiNameStringTaskWide
                                                    • String ID:
                                                    • API String ID: 3103076898-0
                                                    • Opcode ID: d13e4ca0d20e18b7262af4783d55b090f4c2132324a72f78a63646e3dff30957
                                                    • Instruction ID: a3f009bddaadcdd62d2f14bfac9a9ee9a0bc5c024a62150187bec5bdbc8b8cf0
                                                    • Opcode Fuzzy Hash: d13e4ca0d20e18b7262af4783d55b090f4c2132324a72f78a63646e3dff30957
                                                    • Instruction Fuzzy Hash: 82814E71A011499FDF14DBA4CE9CEFE77B8AF59308F100928A522676D0DF34AE48C7A1
                                                    APIs
                                                    • ClientToScreen.USER32(?,?), ref: 6C70A03E
                                                      • Part of subcall function 6C70B323: GetWindowRect.USER32(?,?), ref: 6C70B346
                                                      • Part of subcall function 6C70B323: OffsetRect.USER32(?,?,?), ref: 6C70B392
                                                      • Part of subcall function 6C70B323: PtInRect.USER32(?,?,?), ref: 6C70B3AD
                                                    • GetParent.USER32(?), ref: 6C70A093
                                                    • GetParent.USER32(?), ref: 6C70A0B3
                                                    • IsWindow.USER32(?), ref: 6C70A12F
                                                    • IsWindow.USER32(?), ref: 6C70A1FC
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow$Parent$ClientOffsetScreen
                                                    • String ID:
                                                    • API String ID: 3143362747-0
                                                    • Opcode ID: 67dd885cd0284d1a7efb32d009b3e0ffe12e0a58180070df5108cbe885df2e0d
                                                    • Instruction ID: 881733e958861870ea6f8e8f7a7abe607df7246df175de21144acf6a6f91ce60
                                                    • Opcode Fuzzy Hash: 67dd885cd0284d1a7efb32d009b3e0ffe12e0a58180070df5108cbe885df2e0d
                                                    • Instruction Fuzzy Hash: DD616875B00214EFCF059F65C998AAD7BB5FF89354B2400BAE806AB791CF31AD05CB91
                                                    APIs
                                                    • GetParent.USER32(?), ref: 6C70A2F3
                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 6C70A317
                                                    • GetParent.USER32(?), ref: 6C77B319
                                                    • GetParent.USER32(?), ref: 6C77B33A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$MessagePost
                                                    • String ID:
                                                    • API String ID: 2076725448-0
                                                    • Opcode ID: 7c48a670f072d0e969fbacf00e51553fad0f7d4be5988df03b60494a9f0cf6b6
                                                    • Instruction ID: e95e8b9a36eba85940847afb1723f42b855a7a2cc8f1513d2eaf02f19cb16e00
                                                    • Opcode Fuzzy Hash: 7c48a670f072d0e969fbacf00e51553fad0f7d4be5988df03b60494a9f0cf6b6
                                                    • Instruction Fuzzy Hash: B851E371701218AFDF145B65C95C9BE7BA9EF892A5724007AF916D7B80CF30AC00CBA1
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C705469
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C70556B
                                                    • DestroyWindow.USER32(?,00000000,?,00000000,6C706033,00000000,?,6C776EE2,?,?), ref: 6C705654
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C705661
                                                    • GlobalFree.KERNEL32(00000000), ref: 6C705668
                                                      • Part of subcall function 6C7C655D: GetStockObject.GDI32(00000011), ref: 6C7C657F
                                                      • Part of subcall function 6C7C655D: GetStockObject.GDI32(0000000D), ref: 6C7C658B
                                                      • Part of subcall function 6C7C655D: GetObjectW.GDI32(00000000,0000005C,?), ref: 6C7C659C
                                                      • Part of subcall function 6C7C655D: GetDC.USER32(00000000), ref: 6C7C65AB
                                                      • Part of subcall function 6C7C655D: GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C7C65C2
                                                      • Part of subcall function 6C7C655D: MulDiv.KERNEL32(?,00000048,00000000), ref: 6C7C65CE
                                                      • Part of subcall function 6C7C655D: ReleaseDC.USER32(00000000,00000000), ref: 6C7C65DA
                                                      • Part of subcall function 6C7C666F: GlobalFree.KERNEL32(?), ref: 6C7C6676
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$Object$FreeStock$CapsDestroyDeviceH_prolog3_catchLockReleaseUnlockWindow
                                                    • String ID:
                                                    • API String ID: 15253214-0
                                                    • Opcode ID: e5f09ff7f3350ed7d346f2400d48a83d3a2431030ceb2c53af886c05d2db817d
                                                    • Instruction ID: 9468eafd20ac8aefdda9d2d8a7deb4be211e34c3df657d76194ae77ce8604370
                                                    • Opcode Fuzzy Hash: e5f09ff7f3350ed7d346f2400d48a83d3a2431030ceb2c53af886c05d2db817d
                                                    • Instruction Fuzzy Hash: 49515BB0E0021ADFCF01DFA4DA89AEEBBB5BF08718F140169E811A7751DB749E04CB95
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C71DE6C
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 6C71DECD
                                                    • GetMenuItemInfoW.USER32(?,0000F060,00000000,?), ref: 6C71DFDB
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 6C71E06E
                                                    • UpdateWindow.USER32(?), ref: 6C71E077
                                                      • Part of subcall function 6C78030F: SendMessageW.USER32(?,00000229,00000000,?), ref: 6C780338
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$H_prolog3_InfoInvalidateItemLongMenuMessageRectSendUpdate
                                                    • String ID:
                                                    • API String ID: 1296192460-0
                                                    • Opcode ID: e220c77f0841ca589b15df35f9043cacb1e2469efaeefdfca0279cb73595f7f7
                                                    • Instruction ID: 159a8a2129f1e3fb2a1eca345a3b317b0818ce7c090fc5e22ef0a18804c6e9e6
                                                    • Opcode Fuzzy Hash: e220c77f0841ca589b15df35f9043cacb1e2469efaeefdfca0279cb73595f7f7
                                                    • Instruction Fuzzy Hash: 9951B171A042199FDF21DB60CD8CBEC3B79AF04318F2401B8E819ABAD5DF306A48CB51
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 6C72199F
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D78
                                                      • Part of subcall function 6C702D69: ClientToScreen.USER32(?,?), ref: 6C702D85
                                                    • PtInRect.USER32(?,00000000,?), ref: 6C7219B9
                                                    • PtInRect.USER32(?,?,?), ref: 6C721A32
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientRect$Screen
                                                    • String ID:
                                                    • API String ID: 3187875807-0
                                                    • Opcode ID: 0b15faf4cff672c5e5e0e57865692d9a1dc711840c889b805682839cab376a0c
                                                    • Instruction ID: ac0c883d3040cba5e787fe2df353f9234108e44bf535fd13c4bce3e05c46b036
                                                    • Opcode Fuzzy Hash: 0b15faf4cff672c5e5e0e57865692d9a1dc711840c889b805682839cab376a0c
                                                    • Instruction Fuzzy Hash: 37410972A0450AAFCF10CEA8DA849DEBBB5FF09348F100579E955FB640D635EE45CBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3
                                                    • String ID:
                                                    • API String ID: 3752103406-0
                                                    • Opcode ID: c71149e055b8b7db912c50770ac5094e5ae1de3e88778cd1041fa07eb46de62e
                                                    • Instruction ID: db293da492bcb40e49cf2711bbb484d1d8aaa34ab2f11526d86d1a94e662b1eb
                                                    • Opcode Fuzzy Hash: c71149e055b8b7db912c50770ac5094e5ae1de3e88778cd1041fa07eb46de62e
                                                    • Instruction Fuzzy Hash: BA51F6B09007418FC754CF64C988BE9BBF0BF19308F1484BED95A9B742EB74A609CB51
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C8305D6
                                                      • Part of subcall function 6C702C90: __EH_prolog3.LIBCMT ref: 6C702C97
                                                      • Part of subcall function 6C702C90: GetWindowDC.USER32(00000000,00000004,6C7613FB,00000000), ref: 6C702CC3
                                                      • Part of subcall function 6C70236B: SetMapMode.GDI32(?,?), ref: 6C70237F
                                                      • Part of subcall function 6C70236B: SetMapMode.GDI32(?,?), ref: 6C702391
                                                    • LPtoDP.GDI32(?,?,00000001), ref: 6C83063A
                                                    • LPtoDP.GDI32(?,?,00000001), ref: 6C830659
                                                    • LPtoDP.GDI32(?,?,00000001), ref: 6C830678
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 6C83073C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3Mode$InvalidateRectWindow
                                                    • String ID:
                                                    • API String ID: 1124340077-0
                                                    • Opcode ID: 6492cd2d32dce34083637579b6c1d2a0ba59d15d4ef3951b0066968d3a7a68cb
                                                    • Instruction ID: 5d10b9cf19faa9a12510f5d718df9dbd7b11aa45a15b3b340f8544c77f3b8538
                                                    • Opcode Fuzzy Hash: 6492cd2d32dce34083637579b6c1d2a0ba59d15d4ef3951b0066968d3a7a68cb
                                                    • Instruction Fuzzy Hash: 5441D075700706DFDB24CFA9C588B9AB7F1BF4A314F10992DE5AADB680E770A804CB51
                                                    APIs
                                                    • LoadCursorW.USER32(?,00007904), ref: 6C73FB1D
                                                    • LoadCursorW.USER32(?,00007905), ref: 6C73FB50
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 6C73FB7B
                                                    • CreatePen.GDI32(00000000,00000001,?), ref: 6C73FBF3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CursorLoad$Create
                                                    • String ID:
                                                    • API String ID: 1516763891-0
                                                    • Opcode ID: 39d1b50864daee6ed8d49aafea7a81be90549e1f56ff6f574af8537de1568490
                                                    • Instruction ID: 7c82b2e8537a92d411ee3715b102585b3bd1d84b99616bdf846303fa52c620e0
                                                    • Opcode Fuzzy Hash: 39d1b50864daee6ed8d49aafea7a81be90549e1f56ff6f574af8537de1568490
                                                    • Instruction Fuzzy Hash: 8331F9B1B402119BDB11AF719B5CFEA36E86F49399F1401B6E919CBF52DF348404C762
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C72232C
                                                      • Part of subcall function 6C790927: GetWindowLongW.USER32(?,000000EC), ref: 6C790934
                                                    • OffsetRect.USER32(?,?,00000000), ref: 6C722388
                                                    • UnionRect.USER32(?,?,?), ref: 6C7223A1
                                                    • EqualRect.USER32(?,?), ref: 6C7223AF
                                                    • UpdateWindow.USER32(?), ref: 6C7223E6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                                                    • String ID:
                                                    • API String ID: 4261707372-0
                                                    • Opcode ID: ae19538b22f8915fcdbde54974d2a499bb4af2ee31c09fb740651b446157be1b
                                                    • Instruction ID: b7441fa480408c3f19ffdc720d0a338c99ff30578d29dafa56a7e73368da03cd
                                                    • Opcode Fuzzy Hash: ae19538b22f8915fcdbde54974d2a499bb4af2ee31c09fb740651b446157be1b
                                                    • Instruction Fuzzy Hash: 5E314E71B04649EBDB04CF65DA48ADEF7B9BF09318F10422AE415E3291DB34AA94CB90
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 6C7C8568
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C7C8592
                                                    • GetWindowRect.USER32(?,?), ref: 6C7C85A5
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C7C85FB
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000185,?,6C709A7A,00000000,00000000,00000000,00000000), ref: 6C7C8611
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$RectRedrawVisible
                                                    • String ID:
                                                    • API String ID: 1695962874-0
                                                    • Opcode ID: 2e32cc2ee31b6d9dd2d58d076cd8060be2053594beef4e4e0e1af2ceeb7f25b7
                                                    • Instruction ID: 85175690880cf9965e1a53a2c41cd16319b13fcd27094aeb291f830526d0bb49
                                                    • Opcode Fuzzy Hash: 2e32cc2ee31b6d9dd2d58d076cd8060be2053594beef4e4e0e1af2ceeb7f25b7
                                                    • Instruction Fuzzy Hash: 81311071A04219AFDB11CF68CE84FEE77B8EB09358F104659B525B72D1C770AD40CB51
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Window
                                                    • String ID:
                                                    • API String ID: 924285169-0
                                                    • Opcode ID: 2765156453cd9ca275d653909c4e10f3734d172d3effd7514d799db7ad1214ef
                                                    • Instruction ID: ed240d0401f57d46e93549dcb0be7a0453b416e75c6ae8c0bd4468157cf1a060
                                                    • Opcode Fuzzy Hash: 2765156453cd9ca275d653909c4e10f3734d172d3effd7514d799db7ad1214ef
                                                    • Instruction Fuzzy Hash: 50216431A052099FCB01DF76CA48AEEBBB8BF4A348F244129F901E7A40E730E951D791
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C759B63
                                                    • GetTopWindow.USER32(?), ref: 6C759B90
                                                    • GetDlgCtrlID.USER32(00000000), ref: 6C759BA2
                                                    • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C759BFD
                                                    • GetWindow.USER32(00000000,00000002), ref: 6C759C3F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$CtrlH_prolog3MessageSend
                                                    • String ID:
                                                    • API String ID: 849854284-0
                                                    • Opcode ID: 546119561e2babaa918db8c455a0e8afb4a20fcd410c3ad4af06c0193814a501
                                                    • Instruction ID: 74477e581f2dfcd5265a47494ebb8a442eba4907507a27f8595348be7a146243
                                                    • Opcode Fuzzy Hash: 546119561e2babaa918db8c455a0e8afb4a20fcd410c3ad4af06c0193814a501
                                                    • Instruction Fuzzy Hash: 3821E5B1902218ABDF219B71CF48FEE76BAEF55708F500179E915E3A50DF308E16CA51
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 6C73751A
                                                    • SetWindowsHookExW.USER32(00000007,6C73E7EE,00000000,00000000), ref: 6C73752A
                                                    • UnhookWindowsHookEx.USER32(00000000), ref: 6C737542
                                                    • UpdateWindow.USER32(?), ref: 6C7375BA
                                                    • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C7375D6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: HookWindows$CurrentMessageSendThreadUnhookUpdateWindow
                                                    • String ID:
                                                    • API String ID: 1891640330-0
                                                    • Opcode ID: 4c205eb7ca1bc16f478e43d9e9d270000e42577a14dfea509a2c4cc610d454a8
                                                    • Instruction ID: 66addb8c16d5ab9e7ea9505420c515592b9510a6eb2f2ed64ad03f7d35f6a77f
                                                    • Opcode Fuzzy Hash: 4c205eb7ca1bc16f478e43d9e9d270000e42577a14dfea509a2c4cc610d454a8
                                                    • Instruction Fuzzy Hash: 96210331704621FFDB189F25DA4EB69BB75BB46769F201228E42DD7A91CB30D900CEE0
                                                    APIs
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 6C76410F
                                                    • SendMessageW.USER32(?,00000086,00000000,00000000), ref: 6C764128
                                                    • GetDesktopWindow.USER32 ref: 6C764130
                                                    • SendMessageW.USER32(00000000,0000036D,0000000C,00000000), ref: 6C764150
                                                    • GetWindow.USER32(00000000), ref: 6C764159
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$DesktopLong
                                                    • String ID:
                                                    • API String ID: 2272707703-0
                                                    • Opcode ID: 592ea6712bf617fdd17cf33047aa50c76a184e3ba44bdf889b3ecbac815bb02a
                                                    • Instruction ID: 6426da8b305ec8a3f505afcc7139f8028b57d0204fe9ab6b5a34ca77d6591176
                                                    • Opcode Fuzzy Hash: 592ea6712bf617fdd17cf33047aa50c76a184e3ba44bdf889b3ecbac815bb02a
                                                    • Instruction Fuzzy Hash: 59110631200719BBEA2A4666DE29F9B7A29AB017DDF000128BE1186E90CF21CC40E3D1
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7C8851
                                                    • SendMessageW.USER32(00000000,0000007F,00000000,00000000), ref: 6C7C8874
                                                    • SendMessageW.USER32(00000000,0000007F,00000001,00000000), ref: 6C7C8888
                                                    • GetClassLongW.USER32(00000000,000000DE), ref: 6C7C88E5
                                                    • GetClassLongW.USER32(00000000,000000F2), ref: 6C7C88F6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassLongMessageSend$H_prolog3
                                                    • String ID:
                                                    • API String ID: 350087385-0
                                                    • Opcode ID: e666699210d4c59d0960a5955b4fe1b8bead0b67b4601e832a901f75796e92c9
                                                    • Instruction ID: 3776f46eda31196ffcefc870726802ae146290d0224044024c557c0326f605d1
                                                    • Opcode Fuzzy Hash: e666699210d4c59d0960a5955b4fe1b8bead0b67b4601e832a901f75796e92c9
                                                    • Instruction Fuzzy Hash: 69119071B1462B7FDB224A60CE49FAE7675BF147ACF140231B86076EE0DB70DC148692
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C73EB6D
                                                    • GetWindowRect.USER32(00000000,00000000), ref: 6C73EBB6
                                                    • CreateRoundRectRgn.GDI32(00000000,00000000,00000001,?,00000004,00000004), ref: 6C73EBE0
                                                    • SetWindowRgn.USER32(00000000,?,00000000), ref: 6C73EBF6
                                                    • SetWindowRgn.USER32(00000000,00000000,00000000), ref: 6C73EC0E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$CreateH_prolog3_Round
                                                    • String ID:
                                                    • API String ID: 2502471913-0
                                                    • Opcode ID: eee882166429238d4f7eca32aeca0f918c05436f137b6a6997ed0e9af011e2fb
                                                    • Instruction ID: 6a42a53156023b2434ff8ff8eb1e6e4acf27960ee4ca4de973edef8b0ba5e73f
                                                    • Opcode Fuzzy Hash: eee882166429238d4f7eca32aeca0f918c05436f137b6a6997ed0e9af011e2fb
                                                    • Instruction Fuzzy Hash: D2117FB1A00219DFDF05CFA4C988AEDBB78FF49348F101129E516B3A50DB309D95CBA6
                                                    APIs
                                                      • Part of subcall function 6C77AE21: ReleaseCapture.USER32 ref: 6C77AE5B
                                                      • Part of subcall function 6C77AE21: IsWindow.USER32(?), ref: 6C77AE7C
                                                      • Part of subcall function 6C77AE21: DestroyWindow.USER32(?), ref: 6C77AE8C
                                                      • Part of subcall function 6C77AE21: GetParent.USER32(?), ref: 6C77AEB2
                                                    • InvalidateRect.USER32(?,?,00000001,?,?,?), ref: 6C71B92B
                                                    • UpdateWindow.USER32(?), ref: 6C71B934
                                                      • Part of subcall function 6C71AEB1: GetParent.USER32(00000000), ref: 6C71AEBB
                                                    • SendMessageW.USER32(?,00000111,?,00000000), ref: 6C71B960
                                                    • InvalidateRect.USER32(?,?,00000001,?,?,?), ref: 6C71B982
                                                    • UpdateWindow.USER32(?), ref: 6C71B98B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$InvalidateParentRectUpdate$CaptureDestroyMessageReleaseSend
                                                    • String ID:
                                                    • API String ID: 1969771063-0
                                                    • Opcode ID: 0d92ed9994b7c0a310a0b7cf3cb3f938ac7a5f59560e49a9a5448c9190bf6e36
                                                    • Instruction ID: a09765b1542525a8a3aa057807d871666411a44974c80bea1ce69eec9aa4f6a3
                                                    • Opcode Fuzzy Hash: 0d92ed9994b7c0a310a0b7cf3cb3f938ac7a5f59560e49a9a5448c9190bf6e36
                                                    • Instruction Fuzzy Hash: 1C1160B1701A12FFCB154B60CC48E9AFF35FF45765F040225F65886A60CB716861DBD6
                                                    APIs
                                                    • InvalidateRect.USER32(?,?,00000001,?,?,?), ref: 6C71B898
                                                    • UpdateWindow.USER32(?), ref: 6C71B8A1
                                                      • Part of subcall function 6C71AEB1: GetParent.USER32(00000000), ref: 6C71AEBB
                                                    • SendMessageW.USER32(?,00000111,?,00000000), ref: 6C71B8C5
                                                    • InvalidateRect.USER32(?,?,00000001,?,?,?), ref: 6C71B8E4
                                                    • UpdateWindow.USER32(?), ref: 6C71B8ED
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InvalidateRectUpdateWindow$MessageParentSend
                                                    • String ID:
                                                    • API String ID: 2428145105-0
                                                    • Opcode ID: 6a9f8c66160cc83eb936a4072f7f0a1bf305f272166f4df463baded5f16cfa08
                                                    • Instruction ID: d8f03ac4bbe7c09734ba0c8fb2fa07d8201cd35b05f687f95d8af13b6aa5c43b
                                                    • Opcode Fuzzy Hash: 6a9f8c66160cc83eb936a4072f7f0a1bf305f272166f4df463baded5f16cfa08
                                                    • Instruction Fuzzy Hash: 43113DB2504F04EFCB214F61D944997BBB9FF45659F10093EF6AA41520DB316810DA95
                                                    APIs
                                                    • ScreenToClient.USER32(?,?), ref: 6C7DEEDE
                                                    • SendMessageW.USER32(?,00000366,00000000,00000000), ref: 6C7DEEFA
                                                    • ClientToScreen.USER32(?,?), ref: 6C7DEF07
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 6C7DEF10
                                                    • GetParent.USER32(?), ref: 6C7DEF1E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClientScreen$LongMessageParentSendWindow
                                                    • String ID:
                                                    • API String ID: 4240056119-0
                                                    • Opcode ID: 84b7e5114dbd475b51ba8f1153fffd554539f50d4140467fd77ac5371659d491
                                                    • Instruction ID: 0c4eefffa4d1e21e84a8c6bdf090a5bec6a2b092d18a92067712d996adde87b2
                                                    • Opcode Fuzzy Hash: 84b7e5114dbd475b51ba8f1153fffd554539f50d4140467fd77ac5371659d491
                                                    • Instruction Fuzzy Hash: A8F0813620152877DB120E189C04FBE37ACAF866A5F114239FD35D7180EB74EA01C2E5
                                                    APIs
                                                    • GlobalLock.KERNEL32(00000000), ref: 6C84148B
                                                    • GlobalLock.KERNEL32(?), ref: 6C84149B
                                                    • CreateDCW.GDI32(?,?,?,00000000), ref: 6C8414C1
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 6C8414CC
                                                    • GlobalUnlock.KERNEL32(?), ref: 6C8414D7
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Global$LockUnlock$Create
                                                    • String ID:
                                                    • API String ID: 2536725124-0
                                                    • Opcode ID: 2e11960b82fcbccd1f329e4999383456cbc8e54aa8af8a5b461c9c874d899f39
                                                    • Instruction ID: e09ddeda0cdd8092e7710f6e49600091d982978baa12f6bea56477ca2ceec615
                                                    • Opcode Fuzzy Hash: 2e11960b82fcbccd1f329e4999383456cbc8e54aa8af8a5b461c9c874d899f39
                                                    • Instruction Fuzzy Hash: F901DB3110192DABCB315F68DA08E6B77B9BF857957218421FC15C3500EB39D960C7D0
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C82E719
                                                      • Part of subcall function 6C75913E: GetParent.USER32(?), ref: 6C75916A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3_Parent
                                                    • String ID: Aol
                                                    • API String ID: 383333065-4055122416
                                                    • Opcode ID: 2bdfc080e636397b0a0ce35f54eebd5024975dc577566f2343a1e1f9df91387c
                                                    • Instruction ID: c774a81b16762845e411f4960ea586560cbb6c9002a7633af200f2cd0fc8462d
                                                    • Opcode Fuzzy Hash: 2bdfc080e636397b0a0ce35f54eebd5024975dc577566f2343a1e1f9df91387c
                                                    • Instruction Fuzzy Hash: 3FC17770B00219EFDF14CFA4C999BAD7BB6BF48714F244069E906AB780DB74AD41CB90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent
                                                    • String ID: 07b$17b$17b
                                                    • API String ID: 975332729-3850170145
                                                    • Opcode ID: 4727ff5f2c7d521188a463120721a02177bd0b9d3cd80fadbc4dd382deca9906
                                                    • Instruction ID: 1d547f1a4434312af7eca553f314e836b978bdf5c421384090f751c2741a51fb
                                                    • Opcode Fuzzy Hash: 4727ff5f2c7d521188a463120721a02177bd0b9d3cd80fadbc4dd382deca9906
                                                    • Instruction Fuzzy Hash: 6A6159B56093428FC711DF18C484A4DBBE1BB99308F264D6AE594CBB64D730EC55CB4B
                                                    APIs
                                                    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6C6D12B2), ref: 6C6D26D6
                                                    • UnregisterClassW.USER32(?,?), ref: 6C6D279B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassCriticalDeleteSectionUnregister
                                                    • String ID: ,aDt$,aDt
                                                    • API String ID: 1235663670-3937918192
                                                    • Opcode ID: 2dc57ff77eb5f28ba411104aba2c972354c2c21319276cffbfabec367cea625e
                                                    • Instruction ID: 62764201e493ed3f5c2d355e4cf85f6508cf10efa2a6614c319ff50a53831088
                                                    • Opcode Fuzzy Hash: 2dc57ff77eb5f28ba411104aba2c972354c2c21319276cffbfabec367cea625e
                                                    • Instruction Fuzzy Hash: 96612BB4619341DFD712CF58C494A4ABBF0BB89714F224A1AF984CBB20D735EC849B5B
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C717EBF
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C7E261A: __EH_prolog3.LIBCMT ref: 6C7E2621
                                                      • Part of subcall function 6C79245B: __EH_prolog3.LIBCMT ref: 6C792462
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$H_prolog3_catch
                                                    • String ID: %TsMDIClientArea-%d$MDIClientArea$MDITabsState
                                                    • API String ID: 1670334802-995889277
                                                    • Opcode ID: 7fb5ccd1b2234f2be14abc1504141681288c6e8f25a4b497a8e446e4d8ed7a29
                                                    • Instruction ID: 383f2d1ad6465da29baccf9b47045ae92aec8fbafb4b2614a35bf195cc3c66a6
                                                    • Opcode Fuzzy Hash: 7fb5ccd1b2234f2be14abc1504141681288c6e8f25a4b497a8e446e4d8ed7a29
                                                    • Instruction Fuzzy Hash: 6B516C71E00219DFCF05DFA4CA98AEEBBB5AF49718F150059E802AB790CB71AE05CB51
                                                    APIs
                                                    • __EH_prolog3_catch.LIBCMT ref: 6C717D33
                                                      • Part of subcall function 6C7E2EEA: __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                      • Part of subcall function 6C79245B: __EH_prolog3.LIBCMT ref: 6C792462
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$H_prolog3_catch
                                                    • String ID: %TsMDIClientArea-%d$MDIClientArea$MDITabsState
                                                    • API String ID: 1670334802-995889277
                                                    • Opcode ID: 4b7d011939a956004f3fcb641bfdfc55e43434dbab29b9a8457257d20198e8ec
                                                    • Instruction ID: 5b9e958f9ccad379bd898a2ae86917d1373101bcb29c499b3da64fe76fbef90e
                                                    • Opcode Fuzzy Hash: 4b7d011939a956004f3fcb641bfdfc55e43434dbab29b9a8457257d20198e8ec
                                                    • Instruction Fuzzy Hash: E2416C71A00219EFCF05DBA4CA9CAEDBBB5AF59308F144058E506B7791DB30AE09CB61
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C73BB38
                                                    • SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6C73BB63
                                                    • SendMessageW.USER32(00000000,0000043A,-00000001,00000030), ref: 6C73BBAB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$H_prolog3_
                                                    • String ID: 0
                                                    • API String ID: 3491702567-4108050209
                                                    • Opcode ID: 660667aacef48590ca7e9d5977f3b6c5237a887e6856ff4a4d22f499a629e4b3
                                                    • Instruction ID: 7efbcd474cc79d4d1bab92223640f7056aca982bd850383d76afd333d6fb8d46
                                                    • Opcode Fuzzy Hash: 660667aacef48590ca7e9d5977f3b6c5237a887e6856ff4a4d22f499a629e4b3
                                                    • Instruction Fuzzy Hash: 47317575700619AFDB24CB60CD88FE9B778BF49358F0002A9E15DA7A91DB706D44CF61
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C762022
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 6C762046
                                                    • GetClassInfoW.USER32(?,?,?), ref: 6C762081
                                                      • Part of subcall function 6C75D6EA: __EH_prolog3_catch.LIBCMT ref: 6C75D6F1
                                                      • Part of subcall function 6C75D6EA: GetClassInfoW.USER32(?,?,00000008), ref: 6C75D703
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassInfo$CursorH_prolog3H_prolog3_catchLoad
                                                    • String ID: %Ts:%x:%x:%x:%x
                                                    • API String ID: 937286869-4057404147
                                                    • Opcode ID: b238beb0d3594952ac4b7f13c2b3577f1e6166b3aaa70777382b402bb3b80fc2
                                                    • Instruction ID: ef1ee30c8e0947800af89a283b884c1da7d0bb2cf5b136274ecc86ee79bb21ba
                                                    • Opcode Fuzzy Hash: b238beb0d3594952ac4b7f13c2b3577f1e6166b3aaa70777382b402bb3b80fc2
                                                    • Instruction Fuzzy Hash: 46210DB0E00209AFDB50DFA9DA48BDDBAF4BF18318F10442AE554E7740D7759944CBA5
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000410,00000000,?), ref: 6C6DA0EA
                                                    • CloseHandle.KERNEL32(?), ref: 6C6DA107
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleOpenProcess
                                                    • String ID: Trn$Trn
                                                    • API String ID: 39102293-2422648284
                                                    • Opcode ID: a11e489af4dc31e348f8545f3ceea3cf7e9598567689a2048faef196022e00bb
                                                    • Instruction ID: c0a3b2b2aa84633367cf665d1c9ff8432500d5ef287a73f3e763173a7baaff52
                                                    • Opcode Fuzzy Hash: a11e489af4dc31e348f8545f3ceea3cf7e9598567689a2048faef196022e00bb
                                                    • Instruction Fuzzy Hash: F811C47060C300AFC7118F18D980E0ABBF5EBC6758F01895AF498CB752C231ED448B67
                                                    APIs
                                                    • KillTimer.USER32(?,0000EC1A,?,?,?,6C713EB7,?,?,?), ref: 6C7E05CE
                                                    • GetFocus.USER32 ref: 6C7E05DA
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000,?,?,?,6C713EB7,?,?), ref: 6C7E0608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: FocusKillRedrawTimerWindow
                                                    • String ID: y
                                                    • API String ID: 1950525498-4225443349
                                                    • Opcode ID: 044fb199a027bacb3ee9492cb56c293e4abdbcc120bb663212fc44997321c4e3
                                                    • Instruction ID: 6106a26d729e61d8e8df5fe680b82d041b4e54495f0e1b36313adbdaac806ab2
                                                    • Opcode Fuzzy Hash: 044fb199a027bacb3ee9492cb56c293e4abdbcc120bb663212fc44997321c4e3
                                                    • Instruction Fuzzy Hash: 2B01D633385555FFCB214A26CE08C8ABB75AB4E7697104136F05A96810DF70C491EBD1
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,00000010,00000001,?,6C76DE3A,?,00000010,?,?,?,?), ref: 6C76DCA7
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6C76DCB7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                                    • API String ID: 1646373207-2168864297
                                                    • Opcode ID: c3776ced885d2419c744674c2d46041cc35448adf370ae683f17eb5c10604e95
                                                    • Instruction ID: bc3c6b0dea650ea7f6cd81cbe07bd5794109efc6eab08885e207fc9a4526705e
                                                    • Opcode Fuzzy Hash: c3776ced885d2419c744674c2d46041cc35448adf370ae683f17eb5c10604e95
                                                    • Instruction Fuzzy Hash: C3F09677315109EFAB115F95AE44C2677ADFB993EE330043AF955C2900CA728C00D6A4
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00000000,?,6C7DB8B6,?,?,00000010,?,6C70E997,?,00000010,00000000,00000010,00000000), ref: 6C7DB552
                                                    • GetProcAddress.KERNEL32(00000000,MoveFileTransactedW), ref: 6C7DB562
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: MoveFileTransactedW$kernel32.dll
                                                    • API String ID: 1646373207-608253264
                                                    • Opcode ID: 66bc89e92e0e5d70a8ba8e9b33d4a96e4fc9ee8da7a014a2dbf48729dbe352a5
                                                    • Instruction ID: fbc3401738c8cc6efe4a1b46b2166badf0f5ff2267262db2c4a2ea49c1a8293a
                                                    • Opcode Fuzzy Hash: 66bc89e92e0e5d70a8ba8e9b33d4a96e4fc9ee8da7a014a2dbf48729dbe352a5
                                                    • Instruction Fuzzy Hash: 62F0B473315305AFEF215FA4AD48D2A77AEEB8A3E9B21443AF11685900DA71BC10C7B0
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 6C7C0B81
                                                    • GetClassNameW.USER32(?,?,0000000A), ref: 6C7C0B96
                                                    • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,?,?,00000000,?,00000000,00000004,6C735CCC,00000004,6C6D54D9), ref: 6C7C0BAD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassCompareLongNameStringWindow
                                                    • String ID: combobox
                                                    • API String ID: 1414938635-2240613097
                                                    • Opcode ID: db556b084159424a08d71cf6a260f42503b4dc4c4ede57c722ffa6d992979463
                                                    • Instruction ID: 6298a702644d139541d14fbb37740d367f059d283126cd64076b1c6d1dcd7880
                                                    • Opcode Fuzzy Hash: db556b084159424a08d71cf6a260f42503b4dc4c4ede57c722ffa6d992979463
                                                    • Instruction Fuzzy Hash: 1CF0DC3171522AAFCF00EE688D05EAE77B8AB06328F500364F921E61C0DA24A90486DA
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,?,?,6C77E05F,?,00000001,00000001,00000000,?,00000000,00000008,6C82B129,80000000,CLSID,00000000), ref: 6C76DC41
                                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6C76DC51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                    • API String ID: 1646373207-3913318428
                                                    • Opcode ID: 9c8180030851e34af223b3891ac11450882374efb1615a100da63f6449f9f8ce
                                                    • Instruction ID: 5b881e26fdb34b50b3e6ee1702f3d043eeede0a8381877e69fe9ee5022906f98
                                                    • Opcode Fuzzy Hash: 9c8180030851e34af223b3891ac11450882374efb1615a100da63f6449f9f8ce
                                                    • Instruction Fuzzy Hash: 6CF06832210109AFDF125E55DE08F563B79EB9A39AF200835F91181950D7B18451DBA4
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,FFFF7FFF,?,00000268,6C7DB6C0,?,?,?,?,00000104), ref: 6C7DC815
                                                    • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 6C7DC825
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetFileAttributesTransactedW$kernel32.dll
                                                    • API String ID: 1646373207-1378992308
                                                    • Opcode ID: 2004cb5743fc02c3c143cdf136544862fdc221fd7b374266ff44094cab7f7bb9
                                                    • Instruction ID: 47d2150059b0bd9c5b059a77736623eb6f8a212a0dd5af6524174df2fc8fc8c4
                                                    • Opcode Fuzzy Hash: 2004cb5743fc02c3c143cdf136544862fdc221fd7b374266ff44094cab7f7bb9
                                                    • Instruction Fuzzy Hash: 4BF0F032229209DFEF216E95DE08F6673A9EB0935BF20483EE62081D10C7B19890CAD0
                                                    APIs
                                                    • SetBkColor.GDI32(?,?), ref: 6C785C2C
                                                    • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 6C785C5E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ColorText
                                                    • String ID: !+pl$!+pl
                                                    • API String ID: 2223400495-925720415
                                                    • Opcode ID: f06e41e04960112c595a11b5ccf7f3d13a4755f743ee91beef54a713666f9892
                                                    • Instruction ID: d50798b9d74c3c2e5df3be528cfe6832863356d01424c3942a2c75bceb08b16f
                                                    • Opcode Fuzzy Hash: f06e41e04960112c595a11b5ccf7f3d13a4755f743ee91beef54a713666f9892
                                                    • Instruction Fuzzy Hash: 4401FBB0A00209AFDB09DF58CD4ADAFBBB5EF48304B10816DB81697340D770AE14CAA5
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?,?,6C7DB8E9,?,00000000,?,6C7920B8,?,00000000,00000001,00000000), ref: 6C7DB4FB
                                                    • GetProcAddress.KERNEL32(00000000,DeleteFileTransactedW), ref: 6C7DB50B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: DeleteFileTransactedW$kernel32.dll
                                                    • API String ID: 1646373207-4121130897
                                                    • Opcode ID: 5318dd55385a8d330164b4ec8e24097463aa4e6ebf402aafcda5b3af572f54e8
                                                    • Instruction ID: f1fe040447a3745b4302bb31bca1af91f14ba8c3d813f8da3318751a29bc550d
                                                    • Opcode Fuzzy Hash: 5318dd55385a8d330164b4ec8e24097463aa4e6ebf402aafcda5b3af572f54e8
                                                    • Instruction Fuzzy Hash: 3AF027323112019BCB211A58EE0CF6A37A9EB963AAF21043AE052C2B00DB70A844C6A0
                                                    APIs
                                                    • swprintf.LIBCMT ref: 6C70ECA4
                                                    • GetFileAttributesW.KERNEL32(?,6C784AD4,?), ref: 6C70ECAF
                                                    • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,6C791DF0,?,afx,?,00000104,?,?,00000000), ref: 6C70ECC7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesNameTempswprintf
                                                    • String ID: %s%s%X.tmp
                                                    • API String ID: 2659213859-596088238
                                                    • Opcode ID: 46d9c097b107aee0543692c059ca71ce6a7b1920180679d846485a12aaf63f7f
                                                    • Instruction ID: 239221bfb771667ece2604df4fc50f4940275f0e8e2cdf62331a9134e5ffa51d
                                                    • Opcode Fuzzy Hash: 46d9c097b107aee0543692c059ca71ce6a7b1920180679d846485a12aaf63f7f
                                                    • Instruction Fuzzy Hash: E6F05E7250014DBBCF019F94DE09ECE3B76FF043A9F104560F920A04A0D736CA20AB90
                                                    APIs
                                                    • FindResourceW.KERNEL32(?,?,00000005,?,?,?,6C776EE2,?,?), ref: 6C70542F
                                                    • LoadResource.KERNEL32(?,00000000,?,6C776EE2,?,?), ref: 6C70543B
                                                    • LockResource.KERNEL32(00000000,?,6C776EE2,?,?), ref: 6C705446
                                                      • Part of subcall function 6C705462: __EH_prolog3_catch.LIBCMT ref: 6C705469
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindH_prolog3_catchLoadLock
                                                    • String ID: nwl
                                                    • API String ID: 1059830958-1298933022
                                                    • Opcode ID: 9be1c4d496716b3446b8e4b95e24620936e159218b2a05be25161acefa3c3caa
                                                    • Instruction ID: 510f8ffecfa41290ae4671645e3ae1a2b4200514bc672dfda09df194acad59b9
                                                    • Opcode Fuzzy Hash: 9be1c4d496716b3446b8e4b95e24620936e159218b2a05be25161acefa3c3caa
                                                    • Instruction Fuzzy Hash: C0E06D763012147BEE602AA2AC0CDDB7BACEF563A77048036BE25D2640DA34C400D7B4
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6C88E4FF,00000000,?,6C91553C,?,?,?,6C88E436,00000004,InitializeCriticalSectionEx,6C8D7644,6C8D764C), ref: 6C88E470
                                                    • GetLastError.KERNEL32(?,6C88E4FF,00000000,?,6C91553C,?,?,?,6C88E436,00000004,InitializeCriticalSectionEx,6C8D7644,6C8D764C,00000000,?,6C8834BC), ref: 6C88E47A
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6C88E4A2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$ErrorLast
                                                    • String ID: api-ms-
                                                    • API String ID: 3177248105-2084034818
                                                    • Opcode ID: 74195177a7fd85887203d2ff943f68492fef3482ecbcbab6c788db86f361e36f
                                                    • Instruction ID: 74679d303e8c0a1b50a6cca94ef4dcc6db7800417cb464c615a6cfa1a601b18e
                                                    • Opcode Fuzzy Hash: 74195177a7fd85887203d2ff943f68492fef3482ecbcbab6c788db86f361e36f
                                                    • Instruction Fuzzy Hash: E2E09A30245608BBFB301A61EE09F093A24AB01BB9F248830F90DA8C94D7A5D410A6C8
                                                    APIs
                                                    • GetConsoleOutputCP.KERNEL32(3F4930F2,00000000,00000000,?), ref: 6C88C217
                                                      • Part of subcall function 6C883921: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C887109,?,00000000,-00000008), ref: 6C883982
                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C88C469
                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C88C4AF
                                                    • GetLastError.KERNEL32 ref: 6C88C552
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                    • String ID:
                                                    • API String ID: 2112829910-0
                                                    • Opcode ID: d413d1f96a77c1fae0384707f537d31c68e082b8d3279726b37ee5ce3319e3dd
                                                    • Instruction ID: f6ba0f32cdae94769045b1a5a2262a264774a42a6c0802c553c136a10ee657fb
                                                    • Opcode Fuzzy Hash: d413d1f96a77c1fae0384707f537d31c68e082b8d3279726b37ee5ce3319e3dd
                                                    • Instruction Fuzzy Hash: FED19F75E056489FCF20DFA8C9809EDBBB4FF09314F244A6AE425EBB46D7309946CB50
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C723DB6
                                                    • GetMenuItemCount.USER32(?), ref: 6C723E76
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C723E96
                                                    • GetSubMenu.USER32(00000001,00000000), ref: 6C723FB5
                                                      • Part of subcall function 6C735CA0: __EH_prolog3.LIBCMT ref: 6C735CA7
                                                      • Part of subcall function 6C735CA0: SetRectEmpty.USER32(?), ref: 6C735E60
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountEmptyH_prolog3H_prolog3_Rect
                                                    • String ID:
                                                    • API String ID: 2186202558-0
                                                    • Opcode ID: 8dbb2cf718ceb21ce7f07ec80b232fa88294e363b2a4a1831b373ca27e136a46
                                                    • Instruction ID: 8881b4ef98c7ad8ddb4085c14dcb3225ef8659741a4c6f9c3f1b97cd4fa74334
                                                    • Opcode Fuzzy Hash: 8dbb2cf718ceb21ce7f07ec80b232fa88294e363b2a4a1831b373ca27e136a46
                                                    • Instruction Fuzzy Hash: D2A16E70A04229DFDF14DB24CD58BEDB7B9AF49318F1002A9E51AAB690CB359E45CF90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C716A4A
                                                    • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C716A7D
                                                    • GetWindow.USER32(?,00000005), ref: 6C716B8C
                                                      • Part of subcall function 6C716261: BringWindowToTop.USER32(?), ref: 6C716301
                                                      • Part of subcall function 6C716261: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 6C716355
                                                      • Part of subcall function 6C716261: RedrawWindow.USER32(00000000,00000000,00000000,00000585), ref: 6C716361
                                                    • GetWindow.USER32(?,00000002), ref: 6C716BE6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Redraw$BringH_prolog3MessageSend
                                                    • String ID:
                                                    • API String ID: 259967589-0
                                                    • Opcode ID: 8d19a93a8d03f35dbe40f525d0a53ec7c7ba9fb955ad9f233b429fc2dd2f1c18
                                                    • Instruction ID: 53ae474c5fef872321acdac669ad48e06e9fadaf709973df6d328296a6ea9676
                                                    • Opcode Fuzzy Hash: 8d19a93a8d03f35dbe40f525d0a53ec7c7ba9fb955ad9f233b429fc2dd2f1c18
                                                    • Instruction Fuzzy Hash: 3A81AF71A042159BDF159F61CA9DBEE77B5EF48318F280079EC15ABB80DF74AA04CB90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C72EA2A
                                                    • SelectObject.GDI32(?,0000E831), ref: 6C72EBF7
                                                      • Part of subcall function 6C702BB1: __EH_prolog3.LIBCMT ref: 6C702BB8
                                                      • Part of subcall function 6C702BB1: GetDC.USER32(00000000), ref: 6C702BE4
                                                    • SelectObject.GDI32(00000000,00000000), ref: 6C72EAE8
                                                    • GetSystemMetrics.USER32(00000000), ref: 6C72EBBC
                                                      • Part of subcall function 6C72E793: GetTextExtentPoint32W.GDI32(?,0000007D,00000001,00000000), ref: 6C72E7A5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3ObjectSelect$ExtentMetricsPoint32SystemText
                                                    • String ID:
                                                    • API String ID: 182195805-0
                                                    • Opcode ID: 0eb630b15b7cebeb0c828054e7daed74d8efd9800f5c223fedd6e0f4af2db23a
                                                    • Instruction ID: 855c5ae19e6d4ba2f0de48caf4f9c7878dfd01fd4eb750fee976d67c0f532e26
                                                    • Opcode Fuzzy Hash: 0eb630b15b7cebeb0c828054e7daed74d8efd9800f5c223fedd6e0f4af2db23a
                                                    • Instruction Fuzzy Hash: 3B81DD70A002098FDB04CF69CA88AEEBBB5BF89319F200179E415AB791DB74D945CBD0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID:
                                                    • API String ID: 4218353326-0
                                                    • Opcode ID: d2cb0515c44d46a72e78fef9575b070d45e41f3ad0ee6f1d5702f7f664fd648b
                                                    • Instruction ID: dba53371c5aba92ecd71982870bacc0eefa35a29d61eeedf005add639896e909
                                                    • Opcode Fuzzy Hash: d2cb0515c44d46a72e78fef9575b070d45e41f3ad0ee6f1d5702f7f664fd648b
                                                    • Instruction Fuzzy Hash: CC51C4F29053445BD7209F29AC44A97BAEDAFAA60CF150D3AE449C3B02F771D54887F2
                                                    APIs
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C7DE616
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C7DE66B
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 6C7DE67D
                                                    • IsWindowVisible.USER32(?), ref: 6C7DE757
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$RedrawVisible
                                                    • String ID:
                                                    • API String ID: 2376333906-0
                                                    • Opcode ID: 18ef2323f73a38967a5d1a0d24200c549da86025744f5092cab6eab7071d1734
                                                    • Instruction ID: 800bf5c73784a52b66f4f39dce988928d36e31213947344099657e35fa8f1330
                                                    • Opcode Fuzzy Hash: 18ef2323f73a38967a5d1a0d24200c549da86025744f5092cab6eab7071d1734
                                                    • Instruction Fuzzy Hash: E471A135701215AFDB168F24CA89BA9BBB5FF48764F260169E8196B780DB70F801CBD0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$H_prolog3_Window
                                                    • String ID:
                                                    • API String ID: 3354660761-0
                                                    • Opcode ID: 1f5485219c93dcd43b073a2577cd241538a39aaf6ad97cef356c82417bd39359
                                                    • Instruction ID: e26ee5f0f77d79a5090465a40bdab3aac959dfe2932dbc6f2adaa348867960de
                                                    • Opcode Fuzzy Hash: 1f5485219c93dcd43b073a2577cd241538a39aaf6ad97cef356c82417bd39359
                                                    • Instruction Fuzzy Hash: 1851C1707182109BCF159F60CA9DAED36BAEF45718F180179EC05EBE81CF308A44C7A1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty$Client
                                                    • String ID:
                                                    • API String ID: 1457177775-0
                                                    • Opcode ID: 1eec709ddab03c3c3c0daf386aedb2d7b3f848bead704134b7e820fa3bce57b0
                                                    • Instruction ID: cc91fa479579db7c328d26112d221e8b89a57af909652464d6dd321898282a87
                                                    • Opcode Fuzzy Hash: 1eec709ddab03c3c3c0daf386aedb2d7b3f848bead704134b7e820fa3bce57b0
                                                    • Instruction Fuzzy Hash: 47613D71B041199FCF04DFB9CA98AEDBBB5BF49314F184269E815E7A80DB30AD44CB91
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7E4D3A
                                                    • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6C7E4EBF
                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 6C7E4F03
                                                    • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6C7E4F35
                                                      • Part of subcall function 6C71AC48: __EH_prolog3_GS.LIBCMT ref: 6C71AC52
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$H_prolog3H_prolog3_
                                                    • String ID:
                                                    • API String ID: 1270747201-0
                                                    • Opcode ID: d2a2111469bbf45bf00264c943d78403bf2466592d8a47603826215095967e40
                                                    • Instruction ID: 5d304481ce6bbecb17bac4a01cfb638362a18044b07cc4253dee88014759aa04
                                                    • Opcode Fuzzy Hash: d2a2111469bbf45bf00264c943d78403bf2466592d8a47603826215095967e40
                                                    • Instruction Fuzzy Hash: D1612D75600214DBCF05DF60CA9CAED37B6BF88754F0440B9ED0AAB755DB30AA49CBA1
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C70A5DC
                                                    • GetParent.USER32(?), ref: 6C70A612
                                                    • GetParent.USER32(?), ref: 6C70A630
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 6C70A761
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$H_prolog3RedrawWindow
                                                    • String ID:
                                                    • API String ID: 318655925-0
                                                    • Opcode ID: 035299aded42ab25cafee513c756c25512b359396bf40626b1f7f7a490d5c695
                                                    • Instruction ID: 61e08315b9fee03cbb5646a47a24767a2ddf67e1bb282d42fa57b9f01f5449ec
                                                    • Opcode Fuzzy Hash: 035299aded42ab25cafee513c756c25512b359396bf40626b1f7f7a490d5c695
                                                    • Instruction Fuzzy Hash: D2519FB570021A9FDF05DB64C998ABE77B9FF49398F140069E902AB790DF30AD01CB91
                                                    APIs
                                                    • CloseHandle.KERNEL32(?,00000000,00000002,00000040,00000001), ref: 6C6DBBC1
                                                    • CloseHandle.KERNEL32(?), ref: 6C6DBBC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID: .pid$tor.
                                                    • API String ID: 2962429428-3748248796
                                                    • Opcode ID: 9bf36797cabaa40aa004f6d21644973ba691cfe37785a33af8b8577e2d7d728e
                                                    • Instruction ID: ab3cc76ec2033abeec9cbbda8cff5255a6f2a6079909b8f6dd97cd8154d71b7a
                                                    • Opcode Fuzzy Hash: 9bf36797cabaa40aa004f6d21644973ba691cfe37785a33af8b8577e2d7d728e
                                                    • Instruction Fuzzy Hash: 5B519171600B408BD729CF34D894BAAB7E2FF85308F554A2CD05787A95DB75B884CB44
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C71E215
                                                    • GetMenuItemCount.USER32(?), ref: 6C71E2B3
                                                    • GetMenuItemID.USER32(?,00000000), ref: 6C71E2CF
                                                    • GetSubMenu.USER32(?,?), ref: 6C71E323
                                                      • Part of subcall function 6C77B4DF: __EH_prolog3_catch.LIBCMT ref: 6C77B4E6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountH_prolog3H_prolog3_catch
                                                    • String ID:
                                                    • API String ID: 1548076745-0
                                                    • Opcode ID: 611411af91a19eaba8ced1f4e736ceb8eae3d21269140af266bb05dd275c7008
                                                    • Instruction ID: 66b610dd2e4e4fe5abaacbca50f59c7d43aafbb60bb1a3acd5111cc7c204779d
                                                    • Opcode Fuzzy Hash: 611411af91a19eaba8ced1f4e736ceb8eae3d21269140af266bb05dd275c7008
                                                    • Instruction Fuzzy Hash: BE51D470A0425DDFDF11CBA8CA0CBEDB6F1AF49318F284529E421A7F90DB708905CBA1
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C76A676
                                                      • Part of subcall function 6C73593E: __EH_prolog3.LIBCMT ref: 6C735945
                                                      • Part of subcall function 6C790B2B: IsWindow.USER32(?), ref: 6C790B3A
                                                      • Part of subcall function 6C790B2B: SetWindowTextW.USER32(?,?), ref: 6C790B56
                                                    • GetWindowRect.USER32(?,?), ref: 6C76A78F
                                                    • GetSystemMetrics.USER32(00000010), ref: 6C76A797
                                                    • GetSystemMetrics.USER32(00000011), ref: 6C76A7A6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$MetricsSystem$H_prolog3H_prolog3_RectText
                                                    • String ID:
                                                    • API String ID: 2493215288-0
                                                    • Opcode ID: 3a53a8f6cd27506864b04964f5794de0df7f6ac9fa06c468e0ad5e6cfb228904
                                                    • Instruction ID: d1313455f10604a5d99f6587b948afe9d8016c814ff13da255d3a8a7ce8a1f38
                                                    • Opcode Fuzzy Hash: 3a53a8f6cd27506864b04964f5794de0df7f6ac9fa06c468e0ad5e6cfb228904
                                                    • Instruction Fuzzy Hash: 92516975B002199FCF05DF64CA99AECBBB2BF48314F180065E906AB780DB71AD01CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 160ae01d8a9dc83b97448dd6ad4be985005ca0a58b468e6a38fe0a315619b810
                                                    • Instruction ID: 4ecd469fafa9f7535c15ba4d0436a891bbfd512c88c5af57d585948ec42b32dd
                                                    • Opcode Fuzzy Hash: 160ae01d8a9dc83b97448dd6ad4be985005ca0a58b468e6a38fe0a315619b810
                                                    • Instruction Fuzzy Hash: 2E412771A01308AFD7309F7CCA41BDABBA9EB84B14F10493AE1419BFC0D374E9448780
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect
                                                    • String ID:
                                                    • API String ID: 2270935405-0
                                                    • Opcode ID: cdbdfb703fa3e59c1e7339d473e5e61db67238fbe30624e9274fda8cc24c859b
                                                    • Instruction ID: f6c4c5870f66595e7e22779dff6fd952793ed00e15bb1a33612ba2730a948041
                                                    • Opcode Fuzzy Hash: cdbdfb703fa3e59c1e7339d473e5e61db67238fbe30624e9274fda8cc24c859b
                                                    • Instruction Fuzzy Hash: 0E51D4B09212258FCB60CF59C5C86E53BA8BB09B54F1841BBED1C8FA4ACBB05545DFA1
                                                    APIs
                                                    • FindResourceW.KERNEL32(?,?,00000006,00000000,?,?,?,?,6C6D201F,00000000,?,?), ref: 6C6D4DF4
                                                    • LoadResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E08
                                                    • LockResource.KERNEL32(00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E1A
                                                    • SizeofResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E28
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: baab9237bfad8f56d7df22ddde1401ee03e840a7c4bacfb6c5897dd2b70798f7
                                                    • Instruction ID: 5085dc5d5c8c271982daaedf0b68a7a4be057e7c199510b0196ce17195ce0a22
                                                    • Opcode Fuzzy Hash: baab9237bfad8f56d7df22ddde1401ee03e840a7c4bacfb6c5897dd2b70798f7
                                                    • Instruction Fuzzy Hash: 0F3128726012117BD7208F259C84A7B33ACEF86359B168439FC51D7780E7B5EC06C2BA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$Empty
                                                    • String ID:
                                                    • API String ID: 4257549173-0
                                                    • Opcode ID: 86b46b662c377dcbdb1ed84a6df777aa72b8e1469d89465f0e2ec8d7a1d0f797
                                                    • Instruction ID: e87c7015897709fb57217a581f1b4803af8054b20abae5f53532696639d72054
                                                    • Opcode Fuzzy Hash: 86b46b662c377dcbdb1ed84a6df777aa72b8e1469d89465f0e2ec8d7a1d0f797
                                                    • Instruction Fuzzy Hash: 67416C35B05219DFCF01CF61CA94AEE7BBABF49244B244079E806E7241DB34EE01CBA1
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7A603B
                                                    • SendMessageW.USER32(?,00000421,00000001,?), ref: 6C7A60D2
                                                    • SendMessageW.USER32(?,00000421,00000001,?), ref: 6C7A60E7
                                                    • lstrcpyW.KERNEL32(00000000,00000010,00000000,00000010,6C73D654,00000000,?,00000002,?,?), ref: 6C7A6116
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$H_prolog3lstrcpy
                                                    • String ID:
                                                    • API String ID: 3361160815-0
                                                    • Opcode ID: 7afe7348362c474f41d9c82b681d9772ebcfb2b410c138c2553f3320f7358158
                                                    • Instruction ID: c7e0b07f28b12267d3ee8cce2c1c39d6d6fceaa685c36f9d344388aa1b6c7849
                                                    • Opcode Fuzzy Hash: 7afe7348362c474f41d9c82b681d9772ebcfb2b410c138c2553f3320f7358158
                                                    • Instruction Fuzzy Hash: 6D416CB1A01206DBDF04CFA8CA89FAE7BB4BF05359F100629E5219B6D1CB319946CB51
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C760CD8
                                                    • GetClientRect.USER32(6C8A76B0,?), ref: 6C760D27
                                                      • Part of subcall function 6C7594AD: GetScrollPos.USER32(?,6C82DF26), ref: 6C7594D9
                                                      • Part of subcall function 6C7C311C: GetModuleHandleW.KERNEL32(uxtheme.dll,?,6C760D59,00000001,00000000,?,?,?,00000008,6C71B3D4,?,?,?,000000C8), ref: 6C7C312B
                                                      • Part of subcall function 6C7C311C: GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6C7C313B
                                                      • Part of subcall function 6C7C311C: EncodePointer.KERNEL32(00000000,?,?,?,00000008,6C71B3D4,?,?,?,000000C8), ref: 6C7C3144
                                                    • CreateCompatibleDC.GDI32(?), ref: 6C760DC3
                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C760DE9
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreate$AddressBitmapClientEncodeH_prolog3HandleModulePointerProcRectScroll
                                                    • String ID:
                                                    • API String ID: 1015973060-0
                                                    • Opcode ID: 27ca2b74369e28a59465ab94ce873f95f6a9088b7c316bbd32aa194fa25a7759
                                                    • Instruction ID: 458a8bfbb8a7a415ba3c878f552c73481ab7ef7ff743445175077fd565a0a262
                                                    • Opcode Fuzzy Hash: 27ca2b74369e28a59465ab94ce873f95f6a9088b7c316bbd32aa194fa25a7759
                                                    • Instruction Fuzzy Hash: C64150B1600606AFDB40DF66CA89A99BBF4BF08318B40866DD81987F50DB70E954CFD1
                                                    APIs
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                    • GetClientRect.USER32(?,?), ref: 6C75C8B8
                                                    • IsMenu.USER32(00000000), ref: 6C75C8F4
                                                    • AdjustWindowRectEx.USER32(?,00000000,00000000,?), ref: 6C75C90C
                                                    • GetClientRect.USER32(?,?), ref: 6C75C954
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$ClientWindow$AdjustLongMenu
                                                    • String ID:
                                                    • API String ID: 3435883281-0
                                                    • Opcode ID: c8df7b335f4cd0aaeb73d6eee5e0647856adf47f1910ea509c711f87ebb4e855
                                                    • Instruction ID: 5565d505d07f757a64e89a6a365e1d0be5e853e3c383c03dfd0a55e69a18df81
                                                    • Opcode Fuzzy Hash: c8df7b335f4cd0aaeb73d6eee5e0647856adf47f1910ea509c711f87ebb4e855
                                                    • Instruction Fuzzy Hash: D6319271B00349AFDB10EBB5CA58EBEBBB9AF49248F144529E901A3640DF30A950CA91
                                                    APIs
                                                    • SetRectEmpty.USER32(6C82DF26), ref: 6C7C62C8
                                                    • GetClientRect.USER32(?,6C82DF26), ref: 6C7C62E8
                                                    • GetParent.USER32(?), ref: 6C7C6307
                                                    • OffsetRect.USER32(6C82DF26,00000000,00000000), ref: 6C7C6389
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$ClientEmptyOffsetParent
                                                    • String ID:
                                                    • API String ID: 3819956977-0
                                                    • Opcode ID: 33ec876c90cd659a05b6e7837b72bf2aa1f5d0fd99d3bf1228eb1a27eb8964b3
                                                    • Instruction ID: 069d1f92c0c6e96b0780d34f36b152dbbb5dd6a9913958398bad91ba85385c80
                                                    • Opcode Fuzzy Hash: 33ec876c90cd659a05b6e7837b72bf2aa1f5d0fd99d3bf1228eb1a27eb8964b3
                                                    • Instruction Fuzzy Hash: 123154B1304602AFDB14CF65DA98E79B7A5FF45764710826DE829CBA81DB30FC50CBA1
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,-00000001,00000000,00000000), ref: 6C6EC8E3
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?), ref: 6C6EC94A
                                                    • WideCharToMultiByte.KERNEL32 ref: 6C6EC97B
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,000000FF,000000FF,00000000,00000000,00000000,00000000), ref: 6C6EC9AF
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 626452242-0
                                                    • Opcode ID: 4cf8c62ad2486653ac9dd1a5326a0df97833d66afca26445d0148f60a287f3cb
                                                    • Instruction ID: 4ff4f3b67dc98397f1493b924e51b49c1173fd6a9db03c1096462d519eb436b1
                                                    • Opcode Fuzzy Hash: 4cf8c62ad2486653ac9dd1a5326a0df97833d66afca26445d0148f60a287f3cb
                                                    • Instruction Fuzzy Hash: EF21D6B1509244BFE7106F659C88C6BBBF8EF86358F05492DF45987250E7319904CBA2
                                                    APIs
                                                    • FindResourceW.KERNEL32(?,?,00000006,00000000,?,?,?,?,6C6D201F,00000000,?,?), ref: 6C6D4DF4
                                                    • LoadResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E08
                                                    • LockResource.KERNEL32(00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E1A
                                                    • SizeofResource.KERNEL32(?,00000000,?,?,6C6D201F,00000000,?,?), ref: 6C6D4E28
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: 6f0fcfe27236417cdacf88d5ee4bd8001a8e530cc04a80d5dec3ccfc42b9d830
                                                    • Instruction ID: 03d6a2858968978936b059a7e4091302df194c2ae4e5fa36354932938f89e136
                                                    • Opcode Fuzzy Hash: 6f0fcfe27236417cdacf88d5ee4bd8001a8e530cc04a80d5dec3ccfc42b9d830
                                                    • Instruction Fuzzy Hash: 2121F8316112266BD7204F259C88A7B33ACEF46759B168429FC50C7380E7B5EC06C7A5
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C7EA73D
                                                    • EqualRect.USER32(?,?), ref: 6C7EA763
                                                    • BeginDeferWindowPos.USER32(?), ref: 6C7EA770
                                                    • EndDeferWindowPos.USER32(00000000), ref: 6C7EA796
                                                      • Part of subcall function 6C7785C2: GetWindowRect.USER32(?,?), ref: 6C7785D6
                                                      • Part of subcall function 6C7785C2: GetParent.USER32(?), ref: 6C77862C
                                                      • Part of subcall function 6C7785C2: GetParent.USER32(?), ref: 6C77863F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$DeferParent$BeginEqual
                                                    • String ID:
                                                    • API String ID: 2054780619-0
                                                    • Opcode ID: 1b65ac9b1bda2a3b453220a88dbe76203510ae09059ce5d1407e81fe32067f0a
                                                    • Instruction ID: f29022a12ef8dfedc680dfc6c83b45bf4d4fe25a9d8828603ccb48e2aa49527f
                                                    • Opcode Fuzzy Hash: 1b65ac9b1bda2a3b453220a88dbe76203510ae09059ce5d1407e81fe32067f0a
                                                    • Instruction Fuzzy Hash: A1314175A00609EBCF01DF75CA849DEBBF9BF4D358B20413AE805A7640DB30EA45CBA1
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C704009
                                                      • Part of subcall function 6C77CCAD: __EH_prolog3.LIBCMT ref: 6C77CCB4
                                                    • GetCurrentThread.KERNEL32 ref: 6C704068
                                                    • GetCurrentThreadId.KERNEL32 ref: 6C704071
                                                    • GetVersionExW.KERNEL32 ref: 6C70410D
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CurrentThread$H_prolog3H_prolog3_Version
                                                    • String ID:
                                                    • API String ID: 786120064-0
                                                    • Opcode ID: d207439ce411cae1bb24cdb103419cd4f122ef214298468f1e2de0e7c4928c7e
                                                    • Instruction ID: a5cce948a6048cd2e5fcfd0789f435bf4a5272108ab2c8bd2a87433736aa0130
                                                    • Opcode Fuzzy Hash: d207439ce411cae1bb24cdb103419cd4f122ef214298468f1e2de0e7c4928c7e
                                                    • Instruction Fuzzy Hash: 2241AFB0A01B04CFD720DF2A868868AFAF0BB58705F908A7ED5AEC7B01D770A545DF51
                                                    APIs
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000001,00000000,6C6F4645,6C74E097,00000002,00000000,?,00000000,?,6C6F4645,6C8B9FF0), ref: 6C74E11B
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000000,6C6F4645,6C74E097,00000002,00000000,?,00000000,?,6C6F4645,6C8B9FF0,00000003), ref: 6C74E148
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000185,?,00000000,6C6F4645,6C74E097,00000002,00000000,?,00000000,?,6C6F4645,6C8B9FF0,00000003), ref: 6C74E185
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,?,6C6F4645,6C8B9FF0,00000003,00000001), ref: 6C7CA793
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RedrawWindow
                                                    • String ID:
                                                    • API String ID: 2219533335-0
                                                    • Opcode ID: 1577697818ba12cc7f1c2bbb52d3e3f7446781514e1ce40a7bc4834a631dbf11
                                                    • Instruction ID: f6bf1a2ecb2d6a96f11c5c4aa10a21f106ca1c3548fd9cc2d41b3bf1ae933f57
                                                    • Opcode Fuzzy Hash: 1577697818ba12cc7f1c2bbb52d3e3f7446781514e1ce40a7bc4834a631dbf11
                                                    • Instruction Fuzzy Hash: 34219532782A11A7EB314A24CF48F45B375BF45B79F214125EC587BBA0EB60E810D6D0
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C717C47
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C717CA0
                                                    • GetWindow.USER32(00000000,00000005), ref: 6C717CDE
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C717D0F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$H_prolog3Window
                                                    • String ID:
                                                    • API String ID: 3728102838-0
                                                    • Opcode ID: 3acd5e478188592a84a31ccf128e805bbafb6020fa76edaf4dbed1d3703d3a33
                                                    • Instruction ID: be99fd319ae6d681a23e83f906b9978ba49f17fa49d5633257794a55d60a58fb
                                                    • Opcode Fuzzy Hash: 3acd5e478188592a84a31ccf128e805bbafb6020fa76edaf4dbed1d3703d3a33
                                                    • Instruction Fuzzy Hash: 9221F436708306AFDB209F64CE4EF9D3774AF08764F190465E901ABFA0DF21AD00CA95
                                                    APIs
                                                      • Part of subcall function 6C72EEC7: KillTimer.USER32(?,?,?,00000000,00000000,?,?,?,6C72EE14,?,00000000,00000000,00000000,?,00000000,00000000), ref: 6C72EEF2
                                                    • GetIconInfo.USER32(00000000,?), ref: 6C72EE38
                                                    • GetObjectW.GDI32(0000007C,00000018,?), ref: 6C72EE47
                                                    • DeleteObject.GDI32(0000007C), ref: 6C72EE50
                                                    • DeleteObject.GDI32(?), ref: 6C72EE59
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Object$Delete$IconInfoKillTimer
                                                    • String ID:
                                                    • API String ID: 3402499453-0
                                                    • Opcode ID: 7480048f2afcdff8301c4d7b47a04439fafb6288a4f7bf670f267c92be877285
                                                    • Instruction ID: 6e41cea55f1469ff61cc90e0994eace8f7af9cae576810e8562f8f83ed66fadc
                                                    • Opcode Fuzzy Hash: 7480048f2afcdff8301c4d7b47a04439fafb6288a4f7bf670f267c92be877285
                                                    • Instruction Fuzzy Hash: E5218171A00208AFEF219F70CE49FAE7BB9FF48715F104128F85196A90CB74E944DB90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C766D10
                                                      • Part of subcall function 6C7713D1: __EH_prolog3.LIBCMT ref: 6C7713D8
                                                      • Part of subcall function 6C7713D1: SetRectEmpty.USER32(?), ref: 6C7715CE
                                                      • Part of subcall function 6C807A0F: __EH_prolog3.LIBCMT ref: 6C807A16
                                                    • SetRectEmpty.USER32(?), ref: 6C766DBC
                                                    • SetRectEmpty.USER32(?), ref: 6C766DC3
                                                    • SetRectEmpty.USER32 ref: 6C766E1C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyRect$H_prolog3
                                                    • String ID:
                                                    • API String ID: 3752103406-0
                                                    • Opcode ID: a820fdaaee44ced8c5d35aa8593331cc0a07fa49c655cc764060f7f91a959fec
                                                    • Instruction ID: 0deb456eec41ef5311fc0ad5b2f8c08d5c38e80b88ced98edabaf8ddd3859784
                                                    • Opcode Fuzzy Hash: a820fdaaee44ced8c5d35aa8593331cc0a07fa49c655cc764060f7f91a959fec
                                                    • Instruction Fuzzy Hash: 993101B09056118FCB25CF18D588689BBF4BF08704F1885BEE89D9F746CBB45608CFA5
                                                    APIs
                                                    • DestroyMenu.USER32(?,3F4930F2,?,?,?,6C896030,000000FF), ref: 6C720FC6
                                                    • IsWindow.USER32(?), ref: 6C720FD7
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C720FEB
                                                    • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C721048
                                                      • Part of subcall function 6C7F99C2: GetParent.USER32(00000000), ref: 6C7F9A49
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ContextExternal$BaseBase::~Concurrency::details::DestroyMenuMessageParentSendWindow
                                                    • String ID:
                                                    • API String ID: 3377428259-0
                                                    • Opcode ID: 161077b227d703336cceca1e2f2d1b07d1a63ae1288b102b609af7a6dab909cb
                                                    • Instruction ID: e41683cf1dea1a58175778008d7dfc57524966c7cf6ab4e9b1556725d63d8541
                                                    • Opcode Fuzzy Hash: 161077b227d703336cceca1e2f2d1b07d1a63ae1288b102b609af7a6dab909cb
                                                    • Instruction Fuzzy Hash: 50218D302447418BD725DF34CA98AEAB7B8FF86358F50082DE46693B90DF79A44ACA50
                                                    APIs
                                                    • GetCursorPos.USER32(00000000), ref: 6C77A996
                                                      • Part of subcall function 6C7785C2: GetWindowRect.USER32(?,?), ref: 6C7785D6
                                                      • Part of subcall function 6C7785C2: GetParent.USER32(?), ref: 6C77862C
                                                      • Part of subcall function 6C7785C2: GetParent.USER32(?), ref: 6C77863F
                                                    • ScreenToClient.USER32(?,?), ref: 6C77A9C0
                                                    • SetCapture.USER32(?), ref: 6C77A9EA
                                                    • GetWindowRect.USER32(?,?), ref: 6C77AA2E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ParentRectWindow$CaptureClientCursorScreen
                                                    • String ID:
                                                    • API String ID: 3234571238-0
                                                    • Opcode ID: 08236e904c883f68d7312422ad0c8969e5e25bf5b66047b9106df2eb11aaea1d
                                                    • Instruction ID: 430143ff5fe1dbf23422b2f835b5ca37e59bd002c3b2072623436f2ff13b7875
                                                    • Opcode Fuzzy Hash: 08236e904c883f68d7312422ad0c8969e5e25bf5b66047b9106df2eb11aaea1d
                                                    • Instruction Fuzzy Hash: A421CD70A00209EFDF05CB64C889FEDBBB9FF49359F1001A9E40597340DB75A955CBA1
                                                    APIs
                                                    • SHAppBarMessage.SHELL32(00000007,?), ref: 6C769DED
                                                    • SHAppBarMessage.SHELL32(00000007,?), ref: 6C769E07
                                                    • SHAppBarMessage.SHELL32(00000007,?), ref: 6C769E1E
                                                    • SHAppBarMessage.SHELL32(00000007,?), ref: 6C769E38
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID:
                                                    • API String ID: 2030045667-0
                                                    • Opcode ID: 993ea224e828caee6c82479d50932abed727624069866a0b072a41867be38fcc
                                                    • Instruction ID: c103eccc66ccb4bdda8c15f320fa84d6583531407f4271b6a31b846e1981b671
                                                    • Opcode Fuzzy Hash: 993ea224e828caee6c82479d50932abed727624069866a0b072a41867be38fcc
                                                    • Instruction Fuzzy Hash: D0214F71B05205EFEB14DF61C885BEABBF8FF09754F140029D515E6680EB74A544CFA1
                                                    APIs
                                                    • FindResourceW.KERNEL32(?,?,00000005,00000000,?,0000000F,0000000F,?,6C81201E,00000000,?,?,00000001), ref: 6C81184F
                                                    • LoadResource.KERNEL32(?,00000000,?,0000000F,0000000F,?,6C81201E,00000000,?,?,00000001), ref: 6C811864
                                                    • LockResource.KERNEL32(00000000,?,0000000F,0000000F,?,6C81201E,00000000,?,?,00000001), ref: 6C811876
                                                    • GlobalFree.KERNEL32(?), ref: 6C8118B5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindFreeGlobalLoadLock
                                                    • String ID:
                                                    • API String ID: 3898064442-0
                                                    • Opcode ID: 09d8be4ee69b4cc84baf5f02f9669d4041d4a3cee12eee823c06446a92e1ab75
                                                    • Instruction ID: 67caa687a01f3645b4d630d72c0d2d3f91c748c35c32988ac687b4d1b08fe8aa
                                                    • Opcode Fuzzy Hash: 09d8be4ee69b4cc84baf5f02f9669d4041d4a3cee12eee823c06446a92e1ab75
                                                    • Instruction Fuzzy Hash: 6D11B431605626ABD7319FA5C54CBDAB7F4AF153A9F058678E818A7E40CB70DC04CBE0
                                                    APIs
                                                    • BeginDeferWindowPos.USER32(00000000), ref: 6C82DB15
                                                    • IsWindow.USER32(?), ref: 6C82DB30
                                                    • DeferWindowPos.USER32(00000000,?,00000000,?,?,?,?,00000000), ref: 6C82DB79
                                                    • EndDeferWindowPos.USER32(00000000), ref: 6C82DB84
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Defer$Begin
                                                    • String ID:
                                                    • API String ID: 2880567340-0
                                                    • Opcode ID: a649654703d89f88bf8a9ba22b24474363d41e419bc54b78d8530ebb32b1368b
                                                    • Instruction ID: 6b2cb12a3e3746048f515eb930124338408d25be6f4435c9b2afbc80ff476714
                                                    • Opcode Fuzzy Hash: a649654703d89f88bf8a9ba22b24474363d41e419bc54b78d8530ebb32b1368b
                                                    • Instruction Fuzzy Hash: 51116D71E00209BFDB11DFA8C958FAEBBB9FF08344F14452AA511E3650D734A980CBA1
                                                    APIs
                                                    • GdipCreateFromHDC.GDIPLUS(?,?), ref: 6C7101C0
                                                    • GdipSetInterpolationMode.GDIPLUS(?,?,?,?), ref: 6C7101D1
                                                    • GdipDeleteGraphics.GDIPLUS(?,?,?,?,?), ref: 6C710207
                                                    • GdipDisposeImage.GDIPLUS(?), ref: 6C71020F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Gdip$CreateDeleteDisposeFromGraphicsImageInterpolationMode
                                                    • String ID:
                                                    • API String ID: 3656396538-0
                                                    • Opcode ID: cdea9e1cde8850da8dc500d1423c7bf3c6262d2be99a2d6830209642f86f2482
                                                    • Instruction ID: a88e5dee85832ca577cabe00a1d56c0005514f34c75c4da70fd2432fbbb176c4
                                                    • Opcode Fuzzy Hash: cdea9e1cde8850da8dc500d1423c7bf3c6262d2be99a2d6830209642f86f2482
                                                    • Instruction Fuzzy Hash: B5114672A00219EF8F00DFB8CA44DDEBBB8BF05648B148569E805E7610D732DA16CB90
                                                    APIs
                                                    • GetParent.USER32(?), ref: 6C711B92
                                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C711BD5
                                                    • RedrawWindow.USER32(?,00000000,00000000,00000185,?,?,?,?,?,?,00000000), ref: 6C711BE5
                                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C711BBD
                                                      • Part of subcall function 6C78100C: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6C781080
                                                      • Part of subcall function 6C78100C: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C7810A9
                                                      • Part of subcall function 6C78100C: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C7810C8
                                                      • Part of subcall function 6C78100C: SendMessageW.USER32(?,00000222,?,00000000), ref: 6C7810E2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$ParentRedrawWindow
                                                    • String ID:
                                                    • API String ID: 2139789815-0
                                                    • Opcode ID: 9c25deddf24811fc00e04cf4ef42bbbd0df49bffe5ecb415217ba87b9545f99f
                                                    • Instruction ID: 9df049122eee05eabf928a26e6a4480ad260dd52581fb3645601950074fcc1a5
                                                    • Opcode Fuzzy Hash: 9c25deddf24811fc00e04cf4ef42bbbd0df49bffe5ecb415217ba87b9545f99f
                                                    • Instruction Fuzzy Hash: 4111CB32305605BFEB251A60CD48F6B777AFB8478EF144039F2159A9A0DB719C50DA91
                                                    APIs
                                                    • CreateThread.KERNEL32(00000000,?,6C879A94,00000000,00000004,00000000), ref: 6C8799B8
                                                    • GetLastError.KERNEL32(?,?,?,6C7F27DD,6C7F282D,00000000,00000000,?,00000000,?,6C739AAF,00000001,?,?,?,6C71F462), ref: 6C8799C4
                                                    • __dosmaperr.LIBCMT ref: 6C8799CB
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                    • String ID:
                                                    • API String ID: 2744730728-0
                                                    • Opcode ID: dd76a8eb191e4bb63af3dc8caf15dc54703164ba3c9b897544d6f9f1c21e27fb
                                                    • Instruction ID: 8e48b872460fcfae5600be811473331fc15d9ce662879c5e12986d84d4270fd7
                                                    • Opcode Fuzzy Hash: dd76a8eb191e4bb63af3dc8caf15dc54703164ba3c9b897544d6f9f1c21e27fb
                                                    • Instruction Fuzzy Hash: 5001A132501204BBDB309BA9DD08B9E7B79EB813B9F214629E534865D0EB709544D770
                                                    APIs
                                                    • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6C7E8046
                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 6C7E805D
                                                    • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6C7E8076
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 6C7E80B7
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: c0811e4e66602995caffdf2de9fc440fd5ad00b0c04d996a1bc3cdb663d584e7
                                                    • Instruction ID: b21728782e827e4083f82fc7eff263ee880be5c89ccbf847ee74013729ff75cb
                                                    • Opcode Fuzzy Hash: c0811e4e66602995caffdf2de9fc440fd5ad00b0c04d996a1bc3cdb663d584e7
                                                    • Instruction Fuzzy Hash: 46014471300609AFE7219E29CD88EABB7BDEB457DEF00043AF559C6590D6316C41CF61
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7118C2
                                                      • Part of subcall function 6C702BB1: __EH_prolog3.LIBCMT ref: 6C702BB8
                                                      • Part of subcall function 6C702BB1: GetDC.USER32(00000000), ref: 6C702BE4
                                                    • CreateCompatibleDC.GDI32(?), ref: 6C711913
                                                    • SelectObject.GDI32(?,00000000), ref: 6C711928
                                                    • SelectObject.GDI32(?,00000000), ref: 6C71194A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3ObjectSelect$CompatibleCreate
                                                    • String ID:
                                                    • API String ID: 3900015565-0
                                                    • Opcode ID: d4c16d1a9541e79bff280e13f7e7c6fa567f3bf7d31afd8afff6076485597495
                                                    • Instruction ID: fac487dca658d4e7424f4ba173db94f8981c6e374d0201527a51e1b8314d346d
                                                    • Opcode Fuzzy Hash: d4c16d1a9541e79bff280e13f7e7c6fa567f3bf7d31afd8afff6076485597495
                                                    • Instruction Fuzzy Hash: 05115471D052599BCF11DBA0DA1DBEE7B70BF20708F144025E8157BA90DF709E18CB91
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 6C71FB5D
                                                    • ScreenToClient.USER32(?,?), ref: 6C71FB6A
                                                    • PtInRect.USER32(00000054,?,?), ref: 6C71FB91
                                                      • Part of subcall function 6C72185B: IsWindow.USER32(?), ref: 6C721940
                                                      • Part of subcall function 6C72185B: InvalidateRect.USER32(?,00000054,00000001,?,0000EC12,6C71FBB5), ref: 6C721956
                                                      • Part of subcall function 6C72185B: UpdateWindow.USER32(?), ref: 6C721962
                                                    • KillTimer.USER32(?,0000EC12,00000000), ref: 6C71FBB9
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: RectWindow$ClientCursorInvalidateKillScreenTimerUpdate
                                                    • String ID:
                                                    • API String ID: 1209113495-0
                                                    • Opcode ID: 7a44358d4d33ec89aeb65238a2137e68100f70cc5982bd63eb5cebf3c89858f1
                                                    • Instruction ID: 8226f504f032b3ca93e609fbef1a10f5217ce1fd061084e5a71ca52d417b2686
                                                    • Opcode Fuzzy Hash: 7a44358d4d33ec89aeb65238a2137e68100f70cc5982bd63eb5cebf3c89858f1
                                                    • Instruction Fuzzy Hash: F801E172600215BBDB219B71D958EEEBBBCFF48248F10407AE455D3A10EB30DE40CBA1
                                                    APIs
                                                    • GetMenuItemCount.USER32(00000000), ref: 6C780421
                                                    • GetSubMenu.USER32(00000000,-00000001), ref: 6C780430
                                                    • GetMenuItemCount.USER32(00000000), ref: 6C78043D
                                                    • GetMenuItemID.USER32(00000000,00000000), ref: 6C780453
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$Count
                                                    • String ID:
                                                    • API String ID: 879546783-0
                                                    • Opcode ID: 2f6919b512dfd7ea26562435f86c834b4b9725165ce2d33b274c8ff83ae9ed6c
                                                    • Instruction ID: 5ed09792ef9d5e8ee055bf810a76c003beb8154d75eca63744cc9ff9709402e9
                                                    • Opcode Fuzzy Hash: 2f6919b512dfd7ea26562435f86c834b4b9725165ce2d33b274c8ff83ae9ed6c
                                                    • Instruction Fuzzy Hash: 8D0167B1743159AFDB119F74DA9C95E7AB9DB06389F104435FA69D3600D730CD84C690
                                                    APIs
                                                    • CopyRect.USER32(00000000,00000000), ref: 6C72EFFC
                                                    • InflateRect.USER32(00000000,000000FF,000000FF), ref: 6C72F013
                                                    • InvalidateRect.USER32(00000000,00000000,00000000,?,00000000), ref: 6C72F027
                                                    • UpdateWindow.USER32(00000000), ref: 6C72F030
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Rect$CopyInflateInvalidateUpdateWindow
                                                    • String ID:
                                                    • API String ID: 1253262389-0
                                                    • Opcode ID: 62f01212c7df3c238359cedca52fcfa951aee6c8408efb99ce294d85781353b5
                                                    • Instruction ID: fcd266e985ecdb0fadf31f18a694821a5a5aab5862d6e0823f946f2151335ae6
                                                    • Opcode Fuzzy Hash: 62f01212c7df3c238359cedca52fcfa951aee6c8408efb99ce294d85781353b5
                                                    • Instruction Fuzzy Hash: A1017971605519ABCB20DF68DA08E9FB7B8BF49354F100639F561D3590DB74E904C791
                                                    APIs
                                                    • GetDlgItem.USER32(?,?), ref: 6C75CD1E
                                                    • GetTopWindow.USER32(00000000), ref: 6C75CD2B
                                                      • Part of subcall function 6C75CD14: GetWindow.USER32(00000000,00000002), ref: 6C75CD7A
                                                    • GetTopWindow.USER32(?), ref: 6C75CD5F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Item
                                                    • String ID:
                                                    • API String ID: 369458955-0
                                                    • Opcode ID: ee4ce2ba95ef9059bce1667c423994c32e75ba3b4652c71b456d01ef0e3e7266
                                                    • Instruction ID: f10c8f6b112180f72c12f186cc726e2c4569bf989009c2b408203aebbfdd3c73
                                                    • Opcode Fuzzy Hash: ee4ce2ba95ef9059bce1667c423994c32e75ba3b4652c71b456d01ef0e3e7266
                                                    • Instruction Fuzzy Hash: 08012C31501735ABEF222E618E09F9E3E78AF0A7AAB848220FE10D5510EF31C97196D5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Parent$Focus
                                                    • String ID:
                                                    • API String ID: 384096180-0
                                                    • Opcode ID: 685626618d7080d718ba15b7013c802efb5d194d910a32c0cbe94d0a8145cdd4
                                                    • Instruction ID: 14dbf44c9a303a93de425a2df890ba13ccb88de44038253ce0979f3ffbe18406
                                                    • Opcode Fuzzy Hash: 685626618d7080d718ba15b7013c802efb5d194d910a32c0cbe94d0a8145cdd4
                                                    • Instruction Fuzzy Hash: B8F06272651300ABCF112B74E90C96A76BABF8834531504BDF55687A60DF30A810C790
                                                    APIs
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C71BB90
                                                    • UpdateWindow.USER32(?), ref: 6C71BB99
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 6C71BBC7
                                                    • UpdateWindow.USER32(?), ref: 6C71BBD0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InvalidateRectUpdateWindow
                                                    • String ID:
                                                    • API String ID: 1236202516-0
                                                    • Opcode ID: 8fdc86c85abbae96dda66860738a955cc51215bf097c6370e2334b8f9fc89005
                                                    • Instruction ID: 77320e3e34d4269e4b910580220e815f1cc74055cccbe4d706ec5b015469ede4
                                                    • Opcode Fuzzy Hash: 8fdc86c85abbae96dda66860738a955cc51215bf097c6370e2334b8f9fc89005
                                                    • Instruction Fuzzy Hash: 240108F1544B00DFC7328F30D844AA6B7F4FB89359F140A2EE6EA82954D7716840CB46
                                                    APIs
                                                    • WriteConsoleW.KERNEL32(00000000,6C88A23C,00000000,00000000,00000000,?,6C893A70,00000000,00000001,00000000,?,?,6C88C5A6,?,00000000,00000000), ref: 6C894AA0
                                                    • GetLastError.KERNEL32(?,6C893A70,00000000,00000001,00000000,?,?,6C88C5A6,?,00000000,00000000,?,?,?,6C88BEEC,?), ref: 6C894AAC
                                                      • Part of subcall function 6C894AFD: CloseHandle.KERNEL32(FFFFFFFE,6C894ABC,?,6C893A70,00000000,00000001,00000000,?,?,6C88C5A6,?,00000000,00000000,?,?), ref: 6C894B0D
                                                    • ___initconout.LIBCMT ref: 6C894ABC
                                                      • Part of subcall function 6C894ADE: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6C894A7A,6C893A5D,?,?,6C88C5A6,?,00000000,00000000,?), ref: 6C894AF1
                                                    • WriteConsoleW.KERNEL32(00000000,6C88A23C,00000000,00000000,?,6C893A70,00000000,00000001,00000000,?,?,6C88C5A6,?,00000000,00000000,?), ref: 6C894AD1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                    • String ID:
                                                    • API String ID: 2744216297-0
                                                    • Opcode ID: be7fba1fd37fc5774f70f36be9bb37bad9335f5dc117c1cdc0468528130011b9
                                                    • Instruction ID: d90609085e06be7f3fd4a3bd34b9f5feb778cb2d97e6434be76e85adcc9e7ab2
                                                    • Opcode Fuzzy Hash: be7fba1fd37fc5774f70f36be9bb37bad9335f5dc117c1cdc0468528130011b9
                                                    • Instruction Fuzzy Hash: 6CF05E32200129BBCF321E999C089897E76FB853A4B044924F929A1550C7328820EBD4
                                                    APIs
                                                    • ReadConsoleInputW.KERNEL32(0000000C,6C909120,6C87B9F8,00000000,ABFD2428,6C87BA7C,ABFD23F8,00000001,ABFD23E8,6C909140,00000038,6C87B9F8,6C909120,0000000C,6C6F75D8), ref: 6C88A2BA
                                                    • GetLastError.KERNEL32 ref: 6C88A2C6
                                                      • Part of subcall function 6C88A43A: CloseHandle.KERNEL32(FFFFFFFF,6C88A322,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A44A
                                                    • ___initconin.LIBCMT ref: 6C88A2D6
                                                      • Part of subcall function 6C88A41B: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C88A296,6C87BC7F,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A42E
                                                    • ReadConsoleInputW.KERNEL32(?,?,?), ref: 6C88A2EA
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                                                    • String ID:
                                                    • API String ID: 838051604-0
                                                    • Opcode ID: 4a162ebe3e216cd626d25485f07b5e6bdac0d9cb28a57f80a86e83e5fffbc836
                                                    • Instruction ID: affa069791234b359b1e47b874760f8f0038b8cd3c02f0b6957065ab77d7f260
                                                    • Opcode Fuzzy Hash: 4a162ebe3e216cd626d25485f07b5e6bdac0d9cb28a57f80a86e83e5fffbc836
                                                    • Instruction Fuzzy Hash: D3F03036201069BB8F322F95DD0CCC93F76FF0A3E57044528F91881564C7328864EBD1
                                                    APIs
                                                    • PeekConsoleInputA.KERNEL32(?,?,6C909100,00000000,?,6C87BCFA,00000000,0000000C,6C909100,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A352
                                                    • GetLastError.KERNEL32(?,6C87BCFA,00000000,0000000C,6C909100,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A35E
                                                      • Part of subcall function 6C88A43A: CloseHandle.KERNEL32(FFFFFFFF,6C88A322,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A44A
                                                    • ___initconin.LIBCMT ref: 6C88A36E
                                                      • Part of subcall function 6C88A41B: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C88A296,6C87BC7F,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A42E
                                                    • PeekConsoleInputA.KERNEL32(?,?,6C909100,?,6C87BCFA,00000000,0000000C,6C909100,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A382
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                                                    • String ID:
                                                    • API String ID: 1545762386-0
                                                    • Opcode ID: 858444c0f3fb8c4a797f4bde7ee53da90f64e1dca0e780db9d8041914af9beb2
                                                    • Instruction ID: f660191dd9d3f7f027b597656c1cfcdcd0476540d363022fd73cf907c0623deb
                                                    • Opcode Fuzzy Hash: 858444c0f3fb8c4a797f4bde7ee53da90f64e1dca0e780db9d8041914af9beb2
                                                    • Instruction Fuzzy Hash: 56F01C36612059EB8F322FD5DC088C93F36FB093A57058524FE1882560C7328820EB91
                                                    APIs
                                                      • Part of subcall function 6C790CB0: ShowWindow.USER32(?,?,?,?,6C781B94,00000005,0000EA20), ref: 6C790CC1
                                                    • UpdateWindow.USER32(?), ref: 6C8522FD
                                                    • UpdateWindow.USER32(?), ref: 6C852310
                                                    • SetRectEmpty.USER32(?), ref: 6C85231D
                                                    • SetRectEmpty.USER32(?), ref: 6C85232A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$EmptyRectUpdate$Show
                                                    • String ID:
                                                    • API String ID: 1262231214-0
                                                    • Opcode ID: f02c853a6c60f9d303a7d01c848d0f04dc80f3144d80b018e284170d8340d9dc
                                                    • Instruction ID: cea625eacf2d2ceee3076f182b44e9907bf51337e1a634bd79335926450913eb
                                                    • Opcode Fuzzy Hash: f02c853a6c60f9d303a7d01c848d0f04dc80f3144d80b018e284170d8340d9dc
                                                    • Instruction Fuzzy Hash: 62F0D4712107119FDB609BA0E90CFC27BB8BF05249F118868E0AAC7162DFB4A818CB51
                                                    APIs
                                                    • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A306
                                                    • GetLastError.KERNEL32(?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A312
                                                      • Part of subcall function 6C88A43A: CloseHandle.KERNEL32(FFFFFFFF,6C88A322,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A44A
                                                    • ___initconin.LIBCMT ref: 6C88A322
                                                      • Part of subcall function 6C88A41B: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C88A296,6C87BC7F,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A42E
                                                    • GetNumberOfConsoleInputEvents.KERNEL32(?,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A330
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                                                    • String ID:
                                                    • API String ID: 1600138625-0
                                                    • Opcode ID: 79d754d1cd548c978bfd92407413917596e3e11f38025278240e51eae0726505
                                                    • Instruction ID: 745808f2da5752653326a82e92794011d4db1c93cbad222f98a8585f81a166cc
                                                    • Opcode Fuzzy Hash: 79d754d1cd548c978bfd92407413917596e3e11f38025278240e51eae0726505
                                                    • Instruction Fuzzy Hash: 1DE08037705215E78F316B99E80CCCA3E35EB467F93180534F905C2A50C7618C50D7E1
                                                    APIs
                                                    • GetConsoleMode.KERNEL32(0000000C,?,ABFD2428,6C87BA5B,ABFD23E0,6C909140,00000038,6C87B9F8,6C909120,0000000C,6C6F75D8), ref: 6C88A39E
                                                    • GetLastError.KERNEL32 ref: 6C88A3AA
                                                      • Part of subcall function 6C88A43A: CloseHandle.KERNEL32(FFFFFFFF,6C88A322,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A44A
                                                    • ___initconin.LIBCMT ref: 6C88A3BA
                                                      • Part of subcall function 6C88A41B: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C88A296,6C87BC7F,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A42E
                                                    • GetConsoleMode.KERNEL32(?), ref: 6C88A3C8
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                    • String ID:
                                                    • API String ID: 3067319862-0
                                                    • Opcode ID: da4c8fe01efcee7460f9eb2e49ead2277284a87e7584b77d13ee88a722f19e56
                                                    • Instruction ID: 95ba0f62c8814d905ff4dbe8df6875519c8f3dfd83d96a06b6000c9fa6712cef
                                                    • Opcode Fuzzy Hash: da4c8fe01efcee7460f9eb2e49ead2277284a87e7584b77d13ee88a722f19e56
                                                    • Instruction Fuzzy Hash: 39E04F36605128EB8F313BA5D80C8C93E35EF4A7EA7140534F909D2A90CB658850E7E1
                                                    APIs
                                                    • SetConsoleMode.KERNEL32(0000000C,00000000,ABFD2428,6C87BA63,00000000,ABFD23E0,6C909140,00000038,6C87B9F8,6C909120,0000000C,6C6F75D8), ref: 6C88A3E4
                                                    • GetLastError.KERNEL32 ref: 6C88A3F0
                                                      • Part of subcall function 6C88A43A: CloseHandle.KERNEL32(FFFFFFFF,6C88A322,?,6C87BC90,0000000C,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A44A
                                                    • ___initconin.LIBCMT ref: 6C88A400
                                                      • Part of subcall function 6C88A41B: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C88A296,6C87BC7F,?,?,?,6C87B9A8,6C909100,0000000C,6C6F7244), ref: 6C88A42E
                                                    • SetConsoleMode.KERNEL32(?), ref: 6C88A40E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                    • String ID:
                                                    • API String ID: 3067319862-0
                                                    • Opcode ID: daf0b642f1dded7d41313fc5628eb84ead77e797136d6eb02ebd32d2d6ed1167
                                                    • Instruction ID: c7be00d31255a23b7cbb55f832094bd29ff3eb9fa101af0f72c597d9c91cbb34
                                                    • Opcode Fuzzy Hash: daf0b642f1dded7d41313fc5628eb84ead77e797136d6eb02ebd32d2d6ed1167
                                                    • Instruction Fuzzy Hash: 2EE04F36605028EB8F322BA5D90C8CA7E75FB0A7EA3144634F919C2A90CB21C810D7E1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID: IP=$Port=
                                                    • API String ID: 4218353326-2341451205
                                                    • Opcode ID: bf0be80e3f17a9024df943f40957a1a045b09a8a4a0f65a3ecc759dd41d3008b
                                                    • Instruction ID: 7ff8b46bef3fb20f54c70ae26ff22a50fee37f4e4ce0c20e35c4888e0493ed5e
                                                    • Opcode Fuzzy Hash: bf0be80e3f17a9024df943f40957a1a045b09a8a4a0f65a3ecc759dd41d3008b
                                                    • Instruction Fuzzy Hash: 34B1B6B1A01B408BD324CF39C884B97B7E6FF4A318F144A2ED4AA87A51E731F5468B54
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: __aulldiv
                                                    • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                    • API String ID: 3732870572-1956417402
                                                    • Opcode ID: 4ae150352d31b36e0b92868bd84adb1f595b90bf1e72b2bf602ad70a8e8efec2
                                                    • Instruction ID: e5347a21ad355471cc09c9db224167810b3bf561f231696c8e24adc1f020206c
                                                    • Opcode Fuzzy Hash: 4ae150352d31b36e0b92868bd84adb1f595b90bf1e72b2bf602ad70a8e8efec2
                                                    • Instruction Fuzzy Hash: AC61597CE052499BDF10CEBD8A517AEBBF5AF45B48F10446AD890F7B40C3749982CB61
                                                    APIs
                                                    • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,6C884398,?,?,?,00000055,?,-00000050,?,?,?), ref: 6C88F618
                                                    • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,6C884398,?,?,?,00000055,?,-00000050,?,?), ref: 6C88F64F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CodePageValid
                                                    • String ID: utf8
                                                    • API String ID: 1911128615-905460609
                                                    • Opcode ID: 27650a14d6ef6063492b30aaa31bef7f42bf5f51e8bbdbc47279e2f1a98f2a9f
                                                    • Instruction ID: 3207667718ba8a2093f84ebda7a7b954af640c7fa5a13b23ce5bbc883a92743c
                                                    • Opcode Fuzzy Hash: 27650a14d6ef6063492b30aaa31bef7f42bf5f51e8bbdbc47279e2f1a98f2a9f
                                                    • Instruction Fuzzy Hash: 50512731603246AAFB34AFB8CE81FA673A8EF26708F210D39E51597E80F770D5448660
                                                    APIs
                                                    • __EH_prolog3_GS.LIBCMT ref: 6C72E84D
                                                    • SetRectEmpty.USER32(0000E831), ref: 6C72E88D
                                                      • Part of subcall function 6C7908FD: GetWindowLongW.USER32(?,000000F0), ref: 6C79090A
                                                      • Part of subcall function 6C75913E: GetParent.USER32(?), ref: 6C75916A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyH_prolog3_LongParentRectWindow
                                                    • String ID: Afx:StatusBar
                                                    • API String ID: 531733666-3033333705
                                                    • Opcode ID: 5de06f050adc66fc5e374452992e1e2458af43f0f8043f2375e2078952c2f4e5
                                                    • Instruction ID: 3ec5d6d1c915dc8874b9dddcb3fe1dcc33ee4e52c407962e9df2fd9f694947e8
                                                    • Opcode Fuzzy Hash: 5de06f050adc66fc5e374452992e1e2458af43f0f8043f2375e2078952c2f4e5
                                                    • Instruction Fuzzy Hash: 0A412571700229579F249A798F4CEAF29B9AF46359B100A35B862B7F80DF28D80582F1
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C7121CF
                                                    • SetWindowRgn.USER32(?,00000000,00000001), ref: 6C71221D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect
                                                    • String ID:
                                                    • API String ID: 3200805268-3916222277
                                                    • Opcode ID: faa4716f99e2b0b3f5baa993f93ffd926af580105753182f044138e96dc0bd26
                                                    • Instruction ID: cd0c685f263ad991fd79a0cfbaa8d6915a0d70d2ed21a08f7ae4de6e85fb97a0
                                                    • Opcode Fuzzy Hash: faa4716f99e2b0b3f5baa993f93ffd926af580105753182f044138e96dc0bd26
                                                    • Instruction Fuzzy Hash: 06519E31A08214DBCF05CF65CA9CBEE77B1FF4A318F194179EC06ABA81DB309944CA55
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 6C714C41
                                                    • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 6C714CF3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersRectSystemWindow
                                                    • String ID:
                                                    • API String ID: 85510744-3916222277
                                                    • Opcode ID: dadc344988b410fca61b2a4dd14afc39f25c18c5ce1e80dd0985a85b8bc1a7dc
                                                    • Instruction ID: 58ea14275606bae68869aadcca6d1348e7e24b49541f9ce0dbdbc9e336e38eab
                                                    • Opcode Fuzzy Hash: dadc344988b410fca61b2a4dd14afc39f25c18c5ce1e80dd0985a85b8bc1a7dc
                                                    • Instruction Fuzzy Hash: 7B515571A04218DFCF05CF64C989AEE7BB2FF49318F184179EC0AABA51DB309944CB91
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C7E2EF1
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,0000007C,0000007D,00000001,?,?,00000008,6C757FF5,?,0000E831,00000000,00000004,6C76A4A1,00000002), ref: 6C7E303C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3QueryValue
                                                    • String ID: SOFTWARE\
                                                    • API String ID: 2373586757-3302998844
                                                    • Opcode ID: 14a58604ac0bda868b08e3c3ac83405d92bd16541a5385d0f24a74f56d2aaeb4
                                                    • Instruction ID: 5f455a1863561dce38c90671688649c6449f9000731e59d99da03462fcad2f44
                                                    • Opcode Fuzzy Hash: 14a58604ac0bda868b08e3c3ac83405d92bd16541a5385d0f24a74f56d2aaeb4
                                                    • Instruction Fuzzy Hash: 3031C271601205AFDF159F64CB8CDFE77AAAF48608B104469F8205BBA1CF74DD48DBA1
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C704BB8
                                                    • PathFindExtensionW.SHLWAPI(?,?), ref: 6C704BCE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ExtensionFileFindModuleNamePath
                                                    • String ID: %Ts%Ts.dll
                                                    • API String ID: 2295281026-1896370695
                                                    • Opcode ID: f5a082c467a11773465b50eec66e01108a0757655911157bf90286066f268000
                                                    • Instruction ID: 421f25dadd3c3ba1b3bf59b4ad6ba446763eee195b5744184fbb216102250d85
                                                    • Opcode Fuzzy Hash: f5a082c467a11773465b50eec66e01108a0757655911157bf90286066f268000
                                                    • Instruction Fuzzy Hash: 0C31D372700119ABCB11DA68DA88AEFB7EDEF45318B15417AF815ABA40DB70E805D7D0
                                                    APIs
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6C882D7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ___except_validate_context_record
                                                    • String ID: csm$csm
                                                    • API String ID: 3493665558-3733052814
                                                    • Opcode ID: db903e493b2d7f9ad77a69ce9ab0c82b3cc2e59c789566fad21dfb453f312912
                                                    • Instruction ID: 47785ef3c654f44eefefa09e73f3f14b5d44567f3f606795038e8a67642e9e84
                                                    • Opcode Fuzzy Hash: db903e493b2d7f9ad77a69ce9ab0c82b3cc2e59c789566fad21dfb453f312912
                                                    • Instruction Fuzzy Hash: 7031F772406208EFCF328F55CE4899A3B65FF09719B184D5AFC544DE12C33AE862CBA5
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 6C6E4CB5
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::_Lockit.LIBCPMT ref: 6C6E142F
                                                      • Part of subcall function 6C6E12E2: std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E144A
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6C6E4D27
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                    • String ID: sJnl
                                                    • API String ID: 593203224-2595861282
                                                    • Opcode ID: 8a02be28ed6e23d9dcbe987b052be1d02eef0dad70d4ff3459ff960761bf63b9
                                                    • Instruction ID: 75e26da1c771ee8519493d71cfa531224750695012b89bb8b64bcb0c86409eab
                                                    • Opcode Fuzzy Hash: 8a02be28ed6e23d9dcbe987b052be1d02eef0dad70d4ff3459ff960761bf63b9
                                                    • Instruction Fuzzy Hash: C321ADB190020D8FCB10DFA8C945ADDBBF4FF0D718F10066AE819A7B50E735A954CBA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EmptyH_prolog3_Rect
                                                    • String ID: Afx:ToolBar
                                                    • API String ID: 2941628838-177727192
                                                    • Opcode ID: 3924e7c2abf5a0d3c23854cd7fd5a95f941d8ff62a86d8d5d3891ff95e84cb62
                                                    • Instruction ID: 07a29f4ec39902663c73a88d277ff7efa0d86fffeabad4e70e13f09719dda397
                                                    • Opcode Fuzzy Hash: 3924e7c2abf5a0d3c23854cd7fd5a95f941d8ff62a86d8d5d3891ff95e84cb62
                                                    • Instruction Fuzzy Hash: 20216B71B005199BCF08CFA4DA59AEE7AB1BF08314F150229F806E7790DB64ED548BA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: DestroyHeap
                                                    • String ID: fI$fI
                                                    • API String ID: 2435110975-2386055794
                                                    • Opcode ID: 48941134c364cc06eec7b140131869e7d5d8b6bdbb43d3f26976d01b1627e878
                                                    • Instruction ID: 2735a969f51af228500760b06d8da9f5d80a73784a46451b2533a7f80cb6a137
                                                    • Opcode Fuzzy Hash: 48941134c364cc06eec7b140131869e7d5d8b6bdbb43d3f26976d01b1627e878
                                                    • Instruction Fuzzy Hash: 8921677861C240DFDB929F49E5896097BF0AB56318F664D5AE580C7B20C332ECD0CB57
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: EnableWindow
                                                    • String ID: SMn$$TMn$
                                                    • API String ID: 4266128931-2548786147
                                                    • Opcode ID: dfadd618ec67c51f6a7f6450d6bff912bd07116887c4191f4407eab8e3f2f507
                                                    • Instruction ID: 580b197f8d70c4f7a5cf8a9a92e9373587119f3154ea61dcd82478846f2cbc12
                                                    • Opcode Fuzzy Hash: dfadd618ec67c51f6a7f6450d6bff912bd07116887c4191f4407eab8e3f2f507
                                                    • Instruction Fuzzy Hash: 75214774219A00EFC6119F5DD480849B7F2EF9A354F124E1EE598DB720E235EC25CB5B
                                                    APIs
                                                    • InitializeCriticalSectionEx.KERNEL32(6C910E84,00000000,00000000,EFCA8B15,?,?,?,6C6D10B9), ref: 6C6D2273
                                                    • GetLastError.KERNEL32(EFCA8B15,?,?,?,6C6D10B9), ref: 6C6D22AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalErrorInitializeLastSection
                                                    • String ID: 7%"
                                                    • API String ID: 3413597225-3751066540
                                                    • Opcode ID: c3db96479fbf1624281d020466e3b7048cf3a91b1184fe2a81e2cc75e2f3eb5b
                                                    • Instruction ID: 46aad189425f495716217944bfb3a7565c0063da6c430dbbbdbf70bb50263b66
                                                    • Opcode Fuzzy Hash: c3db96479fbf1624281d020466e3b7048cf3a91b1184fe2a81e2cc75e2f3eb5b
                                                    • Instruction Fuzzy Hash: BC2179B85083009FC712DE99A88494AB7F4AF9A314F02892EF88AC7711C635EC109B26
                                                    APIs
                                                    • LoadIconW.USER32(?,?), ref: 6C764844
                                                    • GetClassInfoW.USER32(?,00000000,'@ql), ref: 6C764893
                                                      • Part of subcall function 6C75D5E6: __snprintf_s.LIBCMT ref: 6C75D632
                                                      • Part of subcall function 6C75D5E6: GetClassInfoW.USER32(?,0000007C,?), ref: 6C75D696
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassInfo$IconLoad__snprintf_s
                                                    • String ID: '@ql
                                                    • API String ID: 247674639-505127071
                                                    • Opcode ID: 178d0ab71108f4341fd558a44ff716a939f0273bef377fe0eb8dd0f53f99a918
                                                    • Instruction ID: b675a4e6030d9abfa980d188bb6233c199e8d0a8b7fac06bd126c7344362effb
                                                    • Opcode Fuzzy Hash: 178d0ab71108f4341fd558a44ff716a939f0273bef377fe0eb8dd0f53f99a918
                                                    • Instruction Fuzzy Hash: 50115E35A00619AFDF01DBE6D948EAE7BB8EF49714F100029F901A7B54DB30D948CB61
                                                    APIs
                                                      • Part of subcall function 6C7C170B: __EH_prolog3.LIBCMT ref: 6C7C1712
                                                    • CallWindowProcW.USER32(?,?,?,Nul,?), ref: 6C75C5BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CallH_prolog3ProcWindow
                                                    • String ID: Nul
                                                    • API String ID: 2079175580-2966358526
                                                    • Opcode ID: 3444f69e8f25573b7787e80b98c77b42da5aba3ba5173f3e07a9ae1e5410145c
                                                    • Instruction ID: 2ed917418d716159e23ea4b7ed43d0970e9c142788688ab7cbcabeba268b8291
                                                    • Opcode Fuzzy Hash: 3444f69e8f25573b7787e80b98c77b42da5aba3ba5173f3e07a9ae1e5410145c
                                                    • Instruction Fuzzy Hash: DE11483630021AFFCF056FA5D908EAABF76FF89255B244026F90587A20DB31D960DB90
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C77DFEB
                                                    • RegOpenKeyExW.ADVAPI32(?,00000001,00000001,00000000,?,00000000,00000008,6C82B129,80000000,CLSID,00000000,00020019,?,00000000,0000022C,6C82AE8D), ref: 6C77E061
                                                      • Part of subcall function 6C76DBCD: __EH_prolog3.LIBCMT ref: 6C76DBD4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$Open
                                                    • String ID: Software\Classes\
                                                    • API String ID: 1097726706-1121929649
                                                    • Opcode ID: fc235e4f5467701995dc0bb0710e6d67940ed6f18b0e0155774888ce495ce13a
                                                    • Instruction ID: 29a28d34fe8f0f8bb5a0acac59df1d2cdebc32c3313759f7458ab785073f1e08
                                                    • Opcode Fuzzy Hash: fc235e4f5467701995dc0bb0710e6d67940ed6f18b0e0155774888ce495ce13a
                                                    • Instruction Fuzzy Hash: 0C117C7591011E9FCF11DB90CA4CEEE7B75BF1530CF284458E81167A40CB359A18DBA2
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C77E10A
                                                    • RegSetValueW.ADVAPI32(?,00000001,00000001,00000000,?), ref: 6C77E16E
                                                      • Part of subcall function 6C76DBCD: __EH_prolog3.LIBCMT ref: 6C76DBD4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$Value
                                                    • String ID: Software\Classes\
                                                    • API String ID: 2677715340-1121929649
                                                    • Opcode ID: f78c7012338a6708883badaa5e079dbcb18eaffc7fd4fede608822cd1f79bfdc
                                                    • Instruction ID: 6b9aa883c0abb9f07a277687521a91b2192705790ab0b18116bfe5a4f749d23e
                                                    • Opcode Fuzzy Hash: f78c7012338a6708883badaa5e079dbcb18eaffc7fd4fede608822cd1f79bfdc
                                                    • Instruction Fuzzy Hash: FA015E72A0011E9BCF11DBA0CE08EEE7B75BF0531CF144518E92166A90CB359A18DBA2
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C77E085
                                                    • RegQueryValueW.ADVAPI32(?,00000001,00000001,00000000), ref: 6C77E0E6
                                                      • Part of subcall function 6C76DBCD: __EH_prolog3.LIBCMT ref: 6C76DBD4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3$QueryValue
                                                    • String ID: Software\Classes\
                                                    • API String ID: 3057600494-1121929649
                                                    • Opcode ID: ed32e3463fa0496c1bb52c8b9d543cb3c0d424b109c7645ece287c721916fdce
                                                    • Instruction ID: 622ab0bee1e06b7421628b41b0256ea8663b4dc307dfe34b253685b0d867f194
                                                    • Opcode Fuzzy Hash: ed32e3463fa0496c1bb52c8b9d543cb3c0d424b109c7645ece287c721916fdce
                                                    • Instruction Fuzzy Hash: D2015A7290011E9FCF11DBA0CE48EEE7775BF05318F184528E82166A80CB359A18DBA2
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 6C794D64
                                                    • FindResourceW.KERNEL32(?,?,STYLE_XML,?,00000000,00000004,6C6F45E3,00000002,00000000,00000003,00000001,?,?,00000000,00000000,0000007E), ref: 6C794DA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: FindH_prolog3Resource
                                                    • String ID: STYLE_XML
                                                    • API String ID: 3036663282-3909253476
                                                    • Opcode ID: 48be6e70e7166ceea4b9a9ac3bc2cf223b8914ed8e38d772dabbc36ecc3f2ffb
                                                    • Instruction ID: b6c98173b443773e89e02d82b8fa6db48863491b496f917ef5e63a642642e4dd
                                                    • Opcode Fuzzy Hash: 48be6e70e7166ceea4b9a9ac3bc2cf223b8914ed8e38d772dabbc36ecc3f2ffb
                                                    • Instruction Fuzzy Hash: F7F0C879B001149BCF10ABB59E4D9AD72B8FF46359B104525E23197F50CB308404DB61
                                                    APIs
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7021B0
                                                    • SelectObject.GDI32(?,00000000), ref: 6C7021C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect
                                                    • String ID: !+pl
                                                    • API String ID: 1517587568-1726606019
                                                    • Opcode ID: 9c1158e84f3912f81fee6f4b94e8b2399477fe4fe1195d5611cab125ce578522
                                                    • Instruction ID: c4bc90b723fdbe70b9f822616ad99fb6830e0c2c19c01bc2af569a4b53b93b48
                                                    • Opcode Fuzzy Hash: 9c1158e84f3912f81fee6f4b94e8b2399477fe4fe1195d5611cab125ce578522
                                                    • Instruction Fuzzy Hash: F2F082737025109B8B118B59DD88C67F7ADEFA56543258035EA188B50AC630EC40C7F0
                                                    APIs
                                                    • GetClassInfoW.USER32(?,6C776EE2,00000010), ref: 6C850080
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: ClassInfo
                                                    • String ID: Button$nwl
                                                    • API String ID: 3534257612-1592980955
                                                    • Opcode ID: c95555a7a6124794e190b354f3b4eac1d1c9c16111ec65b1db92fa8830fd237a
                                                    • Instruction ID: 6d83d67c6aded15456c99b9c46dc37299ee4dd7e4514e977b65d2bfb255ea007
                                                    • Opcode Fuzzy Hash: c95555a7a6124794e190b354f3b4eac1d1c9c16111ec65b1db92fa8830fd237a
                                                    • Instruction Fuzzy Hash: 0CF03071A00208EBDF10DFA5D949DDE7BB8EB49368F044426E904F7240D7709A44CBA5
                                                    APIs
                                                      • Part of subcall function 6C7C170B: __EH_prolog3.LIBCMT ref: 6C7C1712
                                                    • GetCurrentThreadId.KERNEL32 ref: 6C75D8E0
                                                    • SetWindowsHookExW.USER32(00000005,6C75CF69,00000000,00000000), ref: 6C75D8F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CurrentH_prolog3HookThreadWindows
                                                    • String ID: nwl
                                                    • API String ID: 841563119-1298933022
                                                    • Opcode ID: 20d44e1e0308e69a002b001d47237a31db6211bcf8d02dc4cfa81f068ebb6c67
                                                    • Instruction ID: b70d33febd424d0acea6c1d74977e43e12c3cad7ebc89aaadf057b73b03ccc27
                                                    • Opcode Fuzzy Hash: 20d44e1e0308e69a002b001d47237a31db6211bcf8d02dc4cfa81f068ebb6c67
                                                    • Instruction Fuzzy Hash: D8F02731601B0D6BD7305B66AB0CB973AB8DB81B6AF500139E6154AE40DF30D494CAF6
                                                    APIs
                                                    • SetBkColor.GDI32(?,00000000), ref: 6C702258
                                                    • SetBkColor.GDI32(?,00000000), ref: 6C70226A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: Color
                                                    • String ID: !+pl
                                                    • API String ID: 2811717613-1726606019
                                                    • Opcode ID: 9a8cfe559b3d85e9eb1c63bffe6eff53aefdf35abfda51834fe47c28added373
                                                    • Instruction ID: 8bb454b757eb28d72dd32c4e4479633c0e4da46fef8ddc6b49babbbd07d239ba
                                                    • Opcode Fuzzy Hash: 9a8cfe559b3d85e9eb1c63bffe6eff53aefdf35abfda51834fe47c28added373
                                                    • Instruction Fuzzy Hash: 00E08672101605FBCB215F55D804D96BBA6EF45365B10C529F536468A0C732B8D0CB90
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E663
                                                    • InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E679
                                                    • LeaveCriticalSection.KERNEL32(6C914FC8,?,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E687
                                                    • EnterCriticalSection.KERNEL32(00000000,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E694
                                                      • Part of subcall function 6C82E6CA: InitializeCriticalSection.KERNEL32(6C914FC8,?,?,?,6C7C17E8,00000010,00000008,6C77C8E2,6C77C9AC,6C75EE4E,6C77FACA,?,6C75D391), ref: 6C82E6E2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2367947885.000000006C6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C6D0000, based on PE: true
                                                    • Associated: 00000004.00000002.2367930887.000000006C6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368084996.000000006C8A7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368136609.000000006C90A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368158854.000000006C90D000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368182179.000000006C910000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368204762.000000006C913000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C918000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000004.00000002.2368228732.000000006C9C7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_6c6d0000_ShellExperienceHosts.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterInitialize$Leave
                                                    • String ID:
                                                    • API String ID: 713024617-0
                                                    • Opcode ID: 0abd7861433e379096667ed507a55b94691ca765cfbced68ca37ba794897832d
                                                    • Instruction ID: 5d3208379b0340a1b9deda7131237e071b022f944052a76270d9ebbf891c460e
                                                    • Opcode Fuzzy Hash: 0abd7861433e379096667ed507a55b94691ca765cfbced68ca37ba794897832d
                                                    • Instruction Fuzzy Hash: 72F0A4B260811C9FCB301A649D4EF597A38AB0B3AFF561431E01191E41D7788C81CEE5