Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vV5EOx0ipU.exe

Overview

General Information

Sample name:vV5EOx0ipU.exe
renamed because original name is a hash value
Original sample name:c0aed7042e2ac3344c4ccc0bd7d5b04825538f1302074b021f80afdca8747668.exe
Analysis ID:1586716
MD5:bdb812b2a360c206c5ab9de2acd75435
SHA1:2c888c5ef480d02aa6a972906c29d2c498fd430a
SHA256:c0aed7042e2ac3344c4ccc0bd7d5b04825538f1302074b021f80afdca8747668
Tags:exeuser-crep1x
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • vV5EOx0ipU.exe (PID: 6404 cmdline: "C:\Users\user\Desktop\vV5EOx0ipU.exe" MD5: BDB812B2A360C206C5AB9DE2ACD75435)
    • iScrPaint.exe (PID: 6776 cmdline: "C:\Users\user\AppData\Local\Temp\iScrPaint.exe" MD5: 098AC4621EE0E855E0710710736C2955)
      • iScrPaint.exe (PID: 5992 cmdline: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe MD5: 098AC4621EE0E855E0710710736C2955)
        • cmd.exe (PID: 5768 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 2808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • lvHost_v4.exe (PID: 5640 cmdline: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • iScrPaint.exe (PID: 6408 cmdline: "C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe" MD5: 098AC4621EE0E855E0710710736C2955)
    • cmd.exe (PID: 6344 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • iScrPaint.exe (PID: 6976 cmdline: "C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe" MD5: 098AC4621EE0E855E0710710736C2955)
    • cmd.exe (PID: 7000 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • lvHost_v4.exe (PID: 5668 cmdline: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\iScrPaint.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000002.2697973370.00000000094EA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000012.00000002.3565366108.00000000025DC000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                Click to see the 8 entries
                SourceRuleDescriptionAuthorStrings
                10.2.cmd.exe.32507f8.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  10.2.cmd.exe.32507f8.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x10f60:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x10f28:$s2: Elevation:Administrator!new:
                  18.2.lvHost_v4.exe.26286ed.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    18.2.lvHost_v4.exe.26286ed.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x25e617:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x25e6a2:$s1: CoGetObject
                    • 0x25e5fb:$s2: Elevation:Administrator!new:
                    10.2.cmd.exe.52886cd.4.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      Click to see the 28 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\WebUI.dllReversingLabs: Detection: 13%
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\WebUI.dllReversingLabs: Detection: 13%
                      Source: vV5EOx0ipU.exeReversingLabs: Detection: 36%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\ondkpifasfpiuyJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\xgxgnfoJoe Sandbox ML: detected

                      Exploits

                      barindex
                      Source: Yara matchFile source: 10.2.cmd.exe.32507f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.lvHost_v4.exe.26286ed.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.52886cd.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.cmd.exe.562cacd.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.5287acd.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.lvHost_v4.exe.2627aed.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.cmd.exe.50e8acd.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.lvHost_v4.exe.27b26ed.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.lvHost_v4.exe.276ca20.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.cmd.exe.55e7a00.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.cmd.exe.5242a00.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.lvHost_v4.exe.27b1aed.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.cmd.exe.50e96cd.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.cmd.exe.50a3a00.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.lvHost_v4.exe.25e2a20.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.cmd.exe.562d6cd.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2697973370.00000000094EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.3565366108.00000000025DC000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.3190324611.0000000003250000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.3459279888.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5768, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: lvHost_v4.exe PID: 5640, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6344, type: MEMORYSTR
                      Source: vV5EOx0ipU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: ntdll.pdb source: lvHost_v4.exe, 00000008.00000002.3102124081.0000000004334000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106590330.0000000006932000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104779550.0000000005D3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102784686.0000000004B38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105984046.000000000653C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107284723.0000000006F34000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101463436.0000000003F3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104018972.0000000005738000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101289098.0000000003D38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103367885.000000000513F000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102947734.0000000004D35000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103107493.0000000004F31000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3100994144.0000000003B3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103810517.0000000005531000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099208641.0000000002318000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101955475.0000000004135000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104516106.0000000005B33000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102613241.0000000004933000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107062406.0000000006D3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105012121.0000000005F3A000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103601072.000000000533C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104231085.0000000005931000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102453423.0000000004730000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106834191.0000000006B30000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105733026.0000000006339000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102294459.0000000004530000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105455567.0000000006131000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107577502.000000000713B000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099999615.0000000002CA0000.00000004.00001000.00020000.00000000.s
                      Source: Binary string: wntdll.pdbUGP source: iScrPaint.exe, 00000002.00000002.2700347108.00000000098E1000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2701262061.0000000009C40000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990396766.00000000055D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2989966381.0000000004CF9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190419576.0000000004E9F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190937313.0000000005770000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: lvHost_v4.exe, 00000008.00000002.3102124081.0000000004334000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106590330.0000000006932000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104779550.0000000005D3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102784686.0000000004B38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105984046.000000000653C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107284723.0000000006F34000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101463436.0000000003F3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104018972.0000000005738000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101289098.0000000003D38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103367885.000000000513F000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102947734.0000000004D35000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103107493.0000000004F31000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3100994144.0000000003B3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103810517.0000000005531000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099208641.0000000002318000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101955475.0000000004135000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104516106.0000000005B33000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102613241.0000000004933000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107062406.0000000006D3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105012121.0000000005F3A000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103601072.000000000533C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104231085.0000000005931000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102453423.0000000004730000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106834191.0000000006B30000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105733026.0000000006339000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102294459.0000000004530000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105455567.0000000006131000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107577502.000000000713B000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099999615.0000000002CA0000.00000004.00001000.00020000.0000000
                      Source: Binary string: c:\Qt\WebUI2\Release\WebUI.pdb source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C326000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CBB6000.00000002.00000001.01000000.00000009.sdmp
                      Source: Binary string: wntdll.pdb source: iScrPaint.exe, 00000002.00000002.2700347108.00000000098E1000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2701262061.0000000009C40000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990396766.00000000055D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2989966381.0000000004CF9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190419576.0000000004E9F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190937313.0000000005770000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,1_2_0040301A
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,1_2_00402B79
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C97D46D FindFirstFileW,FindClose,2_2_6C97D46D
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,8_2_000000014000A5E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,8_2_0000000140007628
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,8_2_000000014000D848
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: global trafficTCP traffic: 192.168.2.12:52457 -> 162.159.36.2:53
                      Source: unknownDNS traffic detected: query: plerukilo0.site replaycode: Name error (3)
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: plerukilo0.site
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C1EC000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CA7C000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://bugreports.qt-project.org/
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C1EC000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CA7C000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://bugreports.qt-project.org/QHttpNetworkConnectionChannel::_q_receiveReply()
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://epscd.catcert.net/crl/ec-acc.crl0.
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://epscd2.catcert.net/crl/ec-acc.crl0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.catcert.cat0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.???.xx/?search=%s
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.catcert.cat/descarrega/acc.crt0#
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EA5000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C2C4000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CB54000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EA5000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C2C4000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CB54000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-/W3C/DTD
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.000000000924E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.0000000005054000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.000000000271D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.surfok.de/
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                      Source: lvHost_v4.exe, 00000008.00000002.3098687914.00000000004B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/
                      Source: lvHost_v4.exe, 00000008.00000002.3099063854.0000000000A42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sports
                      Source: lvHost_v4.exe, 00000008.00000002.3098687914.000000000050E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdp=4L0
                      Source: lvHost_v4.exe, 00000008.00000003.3094364331.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3097354681.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3092450440.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3082273805.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3095891609.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3084116335.00000000004F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443
                      Source: lvHost_v4.exe, 00000008.00000003.3087124152.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3094364331.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3097354681.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3092450440.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3095891609.00000000004F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443.dllt;
                      Source: lvHost_v4.exe, 00000008.00000003.3087124152.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3084116335.00000000004F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443/
                      Source: lvHost_v4.exe, 00000008.00000003.3079480723.00000000004E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdp
                      Source: lvHost_v4.exe, 00000008.00000003.3080820458.00000000004F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443Q:
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: https://stats.itopupdate.com/multi_app_new.php
                      Source: iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.cat/verCIT-10
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,8_2_0000000140007860
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,8_2_0000000140007860
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140007274 GetDlgItem,GetDlgItem,GetWindowRect,ScreenToClient,ScreenToClient,GetClientRect,CreateDIBSection,GetDC,CreateCompatibleDC,SelectObject,SelectObject,ReleaseDC,SendMessageW,8_2_0000000140007274
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400038A8 KillTimer,GetAsyncKeyState,SetTimer,8_2_00000001400038A8
                      Source: Yara matchFile source: Process Memory Space: iScrPaint.exe PID: 6776, type: MEMORYSTR

                      System Summary

                      barindex
                      Source: 10.2.cmd.exe.32507f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 18.2.lvHost_v4.exe.26286ed.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.52886cd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 16.2.cmd.exe.562cacd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.5287acd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 18.2.lvHost_v4.exe.2627aed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 4.2.cmd.exe.50e8acd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 8.2.lvHost_v4.exe.27b26ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 8.2.lvHost_v4.exe.276ca20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 16.2.cmd.exe.55e7a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.cmd.exe.5242a00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 8.2.lvHost_v4.exe.27b1aed.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 4.2.cmd.exe.50e96cd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 4.2.cmd.exe.50a3a00.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 18.2.lvHost_v4.exe.25e2a20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 16.2.cmd.exe.562d6cd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014011FF38 CreateFileW,malloc,ReadFile,NtClose,8_2_000000014011FF38
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C97E72A: CreateFileW,DeviceIoControl,CloseHandle,2_2_6C97E72A
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00404FAA1_2_00404FAA
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0041206B1_2_0041206B
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0041022D1_2_0041022D
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00411F911_2_00411F91
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC2A78D2_2_6CC2A78D
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C96E84F2_2_6C96E84F
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C96E36C2_2_6C96E36C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000BFFC8_2_000000014000BFFC
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001D0008_2_000000014001D000
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000B8248_2_000000014000B824
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014002F8388_2_000000014002F838
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000D8488_2_000000014000D848
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400210688_2_0000000140021068
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000909C8_2_000000014000909C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400238F88_2_00000001400238F8
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001A9B88_2_000000014001A9B8
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400041C88_2_00000001400041C8
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400231CC8_2_00000001400231CC
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140021A008_2_0000000140021A00
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000E2148_2_000000014000E214
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140024A788_2_0000000140024A78
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001F2A48_2_000000014001F2A4
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000A3788_2_000000014000A378
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140122B988_2_0000000140122B98
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400133908_2_0000000140013390
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140020BB88_2_0000000140020BB8
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400014248_2_0000000140001424
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140008C3C8_2_0000000140008C3C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400054508_2_0000000140005450
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000D4588_2_000000014000D458
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014011B4508_2_000000014011B450
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001048C8_2_000000014001048C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400EE4C48_2_00000001400EE4C4
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400FC53C8_2_00000001400FC53C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000A5E08_2_000000014000A5E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140022E308_2_0000000140022E30
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014002267C8_2_000000014002267C
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001AE888_2_000000014001AE88
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140011EF48_2_0000000140011EF4
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400FF7148_2_00000001400FF714
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001DF448_2_000000014001DF44
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140040F488_2_0000000140040F48
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400187908_2_0000000140018790
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED93FA08_2_00007FF67ED93FA0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5C0708_2_00007FF67EC5C070
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECADD608_2_00007FF67ECADD60
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5C4008_2_00007FF67EC5C400
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5EBB08_2_00007FF67EC5EBB0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED93D108_2_00007FF67ED93D10
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5BC438_2_00007FF67EC5BC43
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EDAE1E08_2_00007FF67EDAE1E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED943008_2_00007FF67ED94300
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5F2508_2_00007FF67EC5F250
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC580108_2_00007FF67EC58010
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC940008_2_00007FF67EC94000
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC60FE08_2_00007FF67EC60FE0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC62FE08_2_00007FF67EC62FE0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC7DF808_2_00007FF67EC7DF80
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5E7808_2_00007FF67EC5E780
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC96F708_2_00007FF67EC96F70
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC58F608_2_00007FF67EC58F60
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED7D9008_2_00007FF67ED7D900
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5B9208_2_00007FF67EC5B920
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECAD8D08_2_00007FF67ECAD8D0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5F8F08_2_00007FF67EC5F8F0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5D8908_2_00007FF67EC5D890
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECEA8A08_2_00007FF67ECEA8A0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5A8A08_2_00007FF67EC5A8A0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5E0508_2_00007FF67EC5E050
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECAA8608_2_00007FF67ECAA860
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC615E08_2_00007FF67EC615E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC975908_2_00007FF67EC97590
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5A5908_2_00007FF67EC5A590
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC54D808_2_00007FF67EC54D80
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED7CD608_2_00007FF67ED7CD60
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC96D408_2_00007FF67EC96D40
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5CF008_2_00007FF67EC5CF00
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC59F008_2_00007FF67EC59F00
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC637008_2_00007FF67EC63700
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC536A08_2_00007FF67EC536A0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC946D08_2_00007FF67EC946D0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5B6808_2_00007FF67EC5B680
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC62E808_2_00007FF67EC62E80
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EE9C6808_2_00007FF67EE9C680
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC536A08_2_00007FF67EC536A0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC59C028_2_00007FF67EC59C02
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC614208_2_00007FF67EC61420
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECADBE08_2_00007FF67ECADBE0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC943E08_2_00007FF67EC943E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5F3E08_2_00007FF67EC5F3E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECAABB08_2_00007FF67ECAABB0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECED3408_2_00007FF67ECED340
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC58C908_2_00007FF67EC58C90
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC964508_2_00007FF67EC96450
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECF64508_2_00007FF67ECF6450
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECAD4408_2_00007FF67ECAD440
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5D4608_2_00007FF67EC5D460
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC972108_2_00007FF67EC97210
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5B2108_2_00007FF67EC5B210
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ED929F08_2_00007FF67ED929F0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC599C48_2_00007FF67EC599C4
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67ECAD1F08_2_00007FF67ECAD1F0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC969908_2_00007FF67EC96990
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC589708_2_00007FF67EC58970
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5830E8_2_00007FF67EC5830E
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC623208_2_00007FF67EC62320
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5A2D08_2_00007FF67EC5A2D0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5FA778_2_00007FF67EC5FA77
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5DA508_2_00007FF67EC5DA50
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC942608_2_00007FF67EC94260
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\iScrPaint.exe 46AFBF1CBD2E1B5E108C133D4079FADDC7347231B0C48566FD967A3070745E7F
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: String function: 0040243B appears 37 times
                      Source: lvHost_v4.exe.4.drStatic PE information: Resource name: ZIP type: Zip archive data (empty)
                      Source: xgxgnfo.16.drStatic PE information: Number of sections : 12 > 10
                      Source: ondkpifasfpiuy.4.drStatic PE information: Number of sections : 12 > 10
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LegalTrademarks OriginalFileName vs vV5EOx0ipU.exe
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2641364890.0000000002401000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs vV5EOx0ipU.exe
                      Source: vV5EOx0ipU.exe, 00000001.00000000.2640348884.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs vV5EOx0ipU.exe
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiScrPaint.exeJ vs vV5EOx0ipU.exe
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebUI.dll, vs vV5EOx0ipU.exe
                      Source: vV5EOx0ipU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 10.2.cmd.exe.32507f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 18.2.lvHost_v4.exe.26286ed.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.52886cd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 16.2.cmd.exe.562cacd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.5287acd.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 18.2.lvHost_v4.exe.2627aed.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 4.2.cmd.exe.50e8acd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 8.2.lvHost_v4.exe.27b26ed.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 8.2.lvHost_v4.exe.276ca20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 16.2.cmd.exe.55e7a00.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.cmd.exe.5242a00.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 8.2.lvHost_v4.exe.27b1aed.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 4.2.cmd.exe.50e96cd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 4.2.cmd.exe.50a3a00.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 18.2.lvHost_v4.exe.25e2a20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 16.2.cmd.exe.562d6cd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: classification engineClassification label: mal100.expl.evad.winEXE@20/15@2/0
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,1_2_00407776
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0040118A GetDiskFreeSpaceExW,SendMessageW,1_2_0040118A
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,1_2_004034C1
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,1_2_00401BDF
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeFile created: C:\Users\user\AppData\Roaming\bgsystem_testJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6964:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2808:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6748:120:WilError_03
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeFile created: C:\Users\user\AppData\Local\Temp\bulk.isoJump to behavior
                      Source: Yara matchFile source: 2.0.iScrPaint.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\iScrPaint.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe, type: DROPPED
                      Source: vV5EOx0ipU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: vV5EOx0ipU.exeReversingLabs: Detection: 36%
                      Source: lvHost_v4.exeString found in binary or memory: -install -runas
                      Source: lvHost_v4.exeString found in binary or memory: -install
                      Source: lvHost_v4.exeString found in binary or memory: -install -nolisense
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeFile read: C:\Users\user\Desktop\vV5EOx0ipU.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\vV5EOx0ipU.exe "C:\Users\user\Desktop\vV5EOx0ipU.exe"
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeProcess created: C:\Users\user\AppData\Local\Temp\iScrPaint.exe "C:\Users\user\AppData\Local\Temp\iScrPaint.exe"
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeProcess created: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe "C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe"
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe "C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe"
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeProcess created: C:\Users\user\AppData\Local\Temp\iScrPaint.exe "C:\Users\user\AppData\Local\Temp\iScrPaint.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeProcess created: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exeJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: webui.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: webui.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: webui.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msftedit.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: comsvcs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmlua.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: webui.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: seukanjejhxc.4.drLNK file: ..\..\Roaming\bgsystem_test\iScrPaint.exe
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
                      Source: vV5EOx0ipU.exeStatic file information: File size 7480499 > 1048576
                      Source: Binary string: ntdll.pdb source: lvHost_v4.exe, 00000008.00000002.3102124081.0000000004334000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106590330.0000000006932000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104779550.0000000005D3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102784686.0000000004B38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105984046.000000000653C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107284723.0000000006F34000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101463436.0000000003F3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104018972.0000000005738000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101289098.0000000003D38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103367885.000000000513F000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102947734.0000000004D35000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103107493.0000000004F31000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3100994144.0000000003B3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103810517.0000000005531000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099208641.0000000002318000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101955475.0000000004135000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104516106.0000000005B33000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102613241.0000000004933000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107062406.0000000006D3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105012121.0000000005F3A000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103601072.000000000533C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104231085.0000000005931000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102453423.0000000004730000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106834191.0000000006B30000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105733026.0000000006339000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102294459.0000000004530000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105455567.0000000006131000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107577502.000000000713B000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099999615.0000000002CA0000.00000004.00001000.00020000.00000000.s
                      Source: Binary string: wntdll.pdbUGP source: iScrPaint.exe, 00000002.00000002.2700347108.00000000098E1000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2701262061.0000000009C40000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990396766.00000000055D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2989966381.0000000004CF9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190419576.0000000004E9F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190937313.0000000005770000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: lvHost_v4.exe, 00000008.00000002.3102124081.0000000004334000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106590330.0000000006932000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104779550.0000000005D3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102784686.0000000004B38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105984046.000000000653C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107284723.0000000006F34000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101463436.0000000003F3E000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104018972.0000000005738000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101289098.0000000003D38000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103367885.000000000513F000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102947734.0000000004D35000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103107493.0000000004F31000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3100994144.0000000003B3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103810517.0000000005531000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099208641.0000000002318000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3101955475.0000000004135000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104516106.0000000005B33000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102613241.0000000004933000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107062406.0000000006D3D000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105012121.0000000005F3A000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3103601072.000000000533C000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3104231085.0000000005931000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102453423.0000000004730000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3106834191.0000000006B30000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105733026.0000000006339000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3102294459.0000000004530000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3105455567.0000000006131000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3107577502.000000000713B000.00000004.00000001.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099999615.0000000002CA0000.00000004.00001000.00020000.0000000
                      Source: Binary string: c:\Qt\WebUI2\Release\WebUI.pdb source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C326000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CBB6000.00000002.00000001.01000000.00000009.sdmp
                      Source: Binary string: wntdll.pdb source: iScrPaint.exe, 00000002.00000002.2700347108.00000000098E1000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2701262061.0000000009C40000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990396766.00000000055D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2989966381.0000000004CF9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190419576.0000000004E9F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190937313.0000000005770000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,1_2_00406D5D
                      Source: xgxgnfo.16.drStatic PE information: real checksum: 0x2891c5 should be: 0x292139
                      Source: ondkpifasfpiuy.4.drStatic PE information: real checksum: 0x2891c5 should be: 0x292139
                      Source: WebUI.dll.2.drStatic PE information: real checksum: 0x7a6eb0 should be: 0x7a4d2c
                      Source: WebUI.dll.1.drStatic PE information: real checksum: 0x7a6eb0 should be: 0x7a4d2c
                      Source: WebUI.dll.1.drStatic PE information: section name: .unwante
                      Source: WebUI.dll.2.drStatic PE information: section name: .unwante
                      Source: lvHost_v4.exe.4.drStatic PE information: section name: Shared
                      Source: ondkpifasfpiuy.4.drStatic PE information: section name: .xdata
                      Source: ondkpifasfpiuy.4.drStatic PE information: section name: gsiu
                      Source: xgxgnfo.16.drStatic PE information: section name: .xdata
                      Source: xgxgnfo.16.drStatic PE information: section name: gsiu
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00411C20 push eax; ret 1_2_00411C4E
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC36120 push ecx; ret 2_2_6CC36133
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC27B5D push ecx; ret 2_2_6CC27B70
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeCode function: 3_2_6C127B5D push ecx; ret 3_2_6C127B70
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001282D push 8B480014h; retf 8_2_0000000140012832
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014001D949 push rsp; ret 8_2_000000014001D94B
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140013D4C pushfq ; ret 8_2_0000000140013D4D
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140013DE5 pushfq ; ret 8_2_0000000140013DE6
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140013F26 pushfq ; ret 8_2_0000000140013F27
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC5597B push 0107B841h; ret 8_2_00007FF67EC55984
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeFile created: C:\Users\user\AppData\Local\Temp\WebUI.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeFile created: C:\Users\user\AppData\Roaming\bgsystem_test\WebUI.dllJump to dropped file
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeFile created: C:\Users\user\AppData\Local\Temp\iScrPaint.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeFile created: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\xgxgnfoJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\ondkpifasfpiuyJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\ondkpifasfpiuyJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\xgxgnfoJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00000001400853D4 GetPrivateProfileStringW,lstrlenW,8_2_00000001400853D4

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\ONDKPIFASFPIUY
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\XGXGNFO
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C467C44
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C467C44
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C467945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C463B54
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C1F7C44
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C1F7945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C1F3B54
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C9A7C44
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI/Special instruction interceptor: Address: 6C9A7945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C9A3B54
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xgxgnfoJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ondkpifasfpiuyJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-11647
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-12181
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeAPI coverage: 4.0 %
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeAPI coverage: 0.0 %
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeAPI coverage: 1.3 %
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe TID: 6028Thread sleep time: -37596s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe TID: 6492Thread sleep time: -90000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe TID: 4116Thread sleep time: -37596s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe TID: 3676Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,1_2_0040301A
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,1_2_00402B79
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C97D46D FindFirstFileW,FindClose,2_2_6C97D46D
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,8_2_000000014000A5E0
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,8_2_0000000140007628
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,8_2_000000014000D848
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6C977613 GetSystemInfo,2_2_6C977613
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                      Source: cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                      Source: iScrPaint.exe, 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000009.00000002.3142233373.000000006CC18000.00000008.00000001.01000000.00000009.sdmpBinary or memory string: l.?AVQEmulationPaintEngine@@
                      Source: iScrPaint.exe, 00000003.00000002.2772938017.000000006C388000.00000008.00000001.01000000.00000009.sdmpBinary or memory string: /l.?AVQEmulationPaintEngine@@
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EF3000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2772938017.000000006C388000.00000008.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3142233373.000000006CC18000.00000008.00000001.01000000.00000009.sdmpBinary or memory string: .?AVQEmulationPaintEngine@@
                      Source: lvHost_v4.exe, 00000008.00000002.3098687914.000000000046E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeAPI call chain: ExitProcess graph end nodegraph_8-21034
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC1B4E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6CC1B4E4
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,1_2_00406D5D
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC1B4E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6CC1B4E4
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: 2_2_6CC265B3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6CC265B3
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeCode function: 3_2_6C11B4E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C11B4E4
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_00007FF67EC511B5 Sleep,exit,SetUnhandledExceptionFilter,exit,8_2_00007FF67EC511B5

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67ECFAEEFJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtOpenKeyEx: Direct from: 0x7FF67ED2AEF2Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x14011D93EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateThreadEx: Direct from: 0x7FF7E7654F47Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E765E074Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF7E770E140Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Indirect: 0x14012000F
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtQuerySystemInformation: Direct from: 0x6BC72560Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateThreadEx: Direct from: 0x7FF67EC54C41Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67EC5C3ABJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF67EE99DD1Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF67ED0F688Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQuerySystemInformation: Direct from: 0x7FF67ED92D77Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E765BC65Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtQuerySystemInformation: Direct from: 0x6BA42560Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67EE9D8BCJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF67ED0829BJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF67EE9EB31
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E77619BBJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x14011D808Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E76644F6Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF7E7899DD1Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67ED09D1AJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF7E78ADAAEJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF7E7792D77Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtOpenKeyEx: Direct from: 0x7FF7E772AEF2Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF7E76FAEEFJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeNtProtectVirtualMemory: Direct from: 0x77387B2EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67EEADAAEJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtProtectVirtualMemory: Direct from: 0x6C43308FJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E770ECF3
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67ECF07BEJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E789EB31
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtReadFile: Direct from: 0x7FF67ECFF1E9Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67EC5BC65Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E789D8BCJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67ED038B3Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF7E76FAB03Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E789EB23
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF67ECFF5DDJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E775E1EDJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF67ED2C1DEJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtReadFile: Direct from: 0x7FF7E76FF1E9Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationToken: Direct from: 0x7FF67ED27F13Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtMapViewOfSection: Direct from: 0x7FF7E789D48EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67EC54AE2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtQuerySystemInformation: Direct from: 0x6C502560Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF67ED0E8D7Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x14011D864
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E789EB0F
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeNtQuerySystemInformation: Direct from: 0x6C772560Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF7E78ADB86Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtReadVirtualMemory: Direct from: 0x7FF67EE999B2Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF67ED2BC32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67EEABBCFJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQuerySystemInformation: Direct from: 0x7FF67EEA5622Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E77038B3Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF67ED2B613Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67ED076A9Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF67EE9C496Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF67ED2BF14Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateThreadEx: Direct from: 0x7FF7E7654C41Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF67EE9C4AD
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtReadVirtualMemory: Direct from: 0x7FF7E78999B2Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF67ED0E140Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtProtectVirtualMemory: Direct from: 0x6C93295CJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF7E770F688Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E77076A9Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF67ED65AA4Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF7E772C1DEJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E7654AE2Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E7727F13Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateThreadEx: Direct from: 0x7FF67EC54F47Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtReadFile: Direct from: 0x14011D832Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E789C4AD
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF7E770E8D7Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationToken: Direct from: 0x7FF67ED5E1EDJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF7E770829BJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF7E772BB00
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x7FF7E789C496Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF67EE9EB23
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF7E7709D1AJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQuerySystemInformation: Direct from: 0x7FF67ECFAB03Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtCreateFile: Direct from: 0x14011D7A4Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FFEA3DE26A1Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQuerySystemInformation: Direct from: 0x7FF67ED619BBJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF7E772BF14Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF67ED0ECF3
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF7E772BC32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF7E76FF5DDJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FFEA3E04B5EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationProcess: Direct from: 0x7FF7E76F07BEJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67ED0C984Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtSetInformationThread: Direct from: 0x7FF7E78ABBCFJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67EE9D48EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtAllocateVirtualMemory: Direct from: 0x140120A3CJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeNtProtectVirtualMemory: Direct from: 0x6FCF2DFAJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtClose: Direct from: 0x7FF67EE9EB0F
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryInformationProcess: Direct from: 0x7FF7E78A5622Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF67EEADB86Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeNtQueryValueKey: Direct from: 0x7FF7E772B613Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe base: 14011BC08Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe base: 3EF010Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe base: 14011BC08Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe base: 2F4010Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000BFFC CharLowerW,lstrcmpiW,lstrcmpiW,lstrlenW,lstrlenW,lstrcmpiW,lstrcmpW,lstrlenW,GetActiveWindow,GetTempPathW,lstrlenW,GetModuleFileNameW,CopyFileW,MessageBoxW,lstrlenW,ShellExecuteW,GetModuleFileNameW,CharLowerW,lstrlenW,8_2_000000014000BFFC
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeProcess created: C:\Users\user\AppData\Local\Temp\iScrPaint.exe "C:\Users\user\AppData\Local\Temp\iScrPaint.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\lvHost_v4.exe C:\Users\user\AppData\Local\Temp\lvHost_v4.exeJump to behavior
                      Source: iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpBinary or memory string: )[%d] Shell_TrayWndTrayNotifyWnd
                      Source: vV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpBinary or memory string: ProgmanU
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_0040D72E cpuid 1_2_0040D72E
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,1_2_00401F9D
                      Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exeCode function: GetLocaleInfoA,2_2_6CC37110
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,1_2_00401626
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_000000014000EE50 GetDlgItem,GetUserNameW,wsprintfW,GetDlgItem,SetWindowTextW,GetDlgItem,SetWindowTextW,8_2_000000014000EE50
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeCode function: 8_2_0000000140026184 GetTimeZoneInformation,8_2_0000000140026184
                      Source: C:\Users\user\Desktop\vV5EOx0ipU.exeCode function: 1_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,1_2_00404FAA
                      Source: C:\Users\user\AppData\Local\Temp\lvHost_v4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      11
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      11
                      Masquerading
                      11
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts3
                      Native API
                      Boot or Logon Initialization Scripts212
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory211
                      Security Software Discovery
                      Remote Desktop Protocol11
                      Input Capture
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      Abuse Elevation Control Mechanism
                      212
                      Process Injection
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares1
                      Archive Collected Data
                      1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object Model2
                      Clipboard Data
                      Protocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Abuse Elevation Control Mechanism
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                      DLL Side-Loading
                      DCSync4
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem146
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586716 Sample: vV5EOx0ipU.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 58 plerukilo0.site 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for dropped file 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 3 other signatures 2->66 10 vV5EOx0ipU.exe 6 2->10         started        13 iScrPaint.exe 1 2->13         started        16 iScrPaint.exe 1 2->16         started        signatures3 process4 file5 54 C:\Users\user\AppData\Local\...\iScrPaint.exe, PE32 10->54 dropped 56 C:\Users\user\AppData\Local\Temp\WebUI.dll, PE32 10->56 dropped 18 iScrPaint.exe 5 10->18         started        92 Maps a DLL or memory area into another process 13->92 94 Found direct / indirect Syscall (likely to bypass EDR) 13->94 22 cmd.exe 2 13->22         started        24 cmd.exe 1 16->24         started        signatures6 process7 file8 44 C:\Users\user\AppData\...\iScrPaint.exe, PE32 18->44 dropped 46 C:\Users\user\AppData\Roaming\...\WebUI.dll, PE32 18->46 dropped 68 Switches to a custom stack to bypass stack traces 18->68 70 Found direct / indirect Syscall (likely to bypass EDR) 18->70 26 iScrPaint.exe 1 18->26         started        48 C:\Users\user\AppData\Local\Temp\xgxgnfo, PE32+ 22->48 dropped 72 Writes to foreign memory regions 22->72 74 Maps a DLL or memory area into another process 22->74 29 lvHost_v4.exe 22->29         started        31 conhost.exe 22->31         started        33 conhost.exe 24->33         started        signatures9 process10 signatures11 86 Maps a DLL or memory area into another process 26->86 88 Switches to a custom stack to bypass stack traces 26->88 90 Found direct / indirect Syscall (likely to bypass EDR) 26->90 35 cmd.exe 5 26->35         started        process12 file13 50 C:\Users\user\AppData\...\ondkpifasfpiuy, PE32+ 35->50 dropped 52 C:\Users\user\AppData\Local\...\lvHost_v4.exe, PE32+ 35->52 dropped 76 Writes to foreign memory regions 35->76 78 Found hidden mapped module (file has been removed from disk) 35->78 80 Maps a DLL or memory area into another process 35->80 82 Switches to a custom stack to bypass stack traces 35->82 39 lvHost_v4.exe 35->39         started        42 conhost.exe 35->42         started        signatures14 process15 signatures16 84 Found direct / indirect Syscall (likely to bypass EDR) 39->84

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      vV5EOx0ipU.exe37%ReversingLabsWin32.Adware.RedCap
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\ondkpifasfpiuy100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\xgxgnfo100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\WebUI.dll13%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\iScrPaint.exe3%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\lvHost_v4.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\bgsystem_test\WebUI.dll13%ReversingLabs
                      C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe3%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.softwareok.de/?Download=Find.Same.Images.OK0%Avira URL Cloudsafe
                      https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sports0%Avira URL Cloudsafe
                      http://www.???.xx/?search=%s0%Avira URL Cloudsafe
                      https://plerukilo0.site:443/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdp0%Avira URL Cloudsafe
                      https://plerukilo0.site:443.dllt;0%Avira URL Cloudsafe
                      https://plerukilo0.site/0%Avira URL Cloudsafe
                      http://www.softwareok.de/?Freeware/Find.Same.Images.OK0%Avira URL Cloudsafe
                      https://stats.itopupdate.com/multi_app_new.php0%Avira URL Cloudsafe
                      https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdp=4L00%Avira URL Cloudsafe
                      http://epscd.catcert.net/crl/ec-acc.crl0.0%Avira URL Cloudsafe
                      https://plerukilo0.site:4430%Avira URL Cloudsafe
                      https://www.catcert.cat/verCIT-100%Avira URL Cloudsafe
                      http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=00%Avira URL Cloudsafe
                      http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History0%Avira URL Cloudsafe
                      https://plerukilo0.site:443Q:0%Avira URL Cloudsafe
                      http://ocsp.catcert.cat00%Avira URL Cloudsafe
                      http://www.catcert.cat/descarrega/acc.crt0#0%Avira URL Cloudsafe
                      http://bugreports.qt-project.org/QHttpNetworkConnectionChannel::_q_receiveReply()0%Avira URL Cloudsafe
                      https://plerukilo0.site:443/0%Avira URL Cloudsafe
                      http://www.softwareok.de0%Avira URL Cloudsafe
                      http://www.surfok.de/0%Avira URL Cloudsafe
                      http://bugreports.qt-project.org/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      plerukilo0.site
                      unknown
                      unknownfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://stats.itopupdate.com/multi_app_new.phpvV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sportslvHost_v4.exe, 00000008.00000002.3099063854.0000000000A42000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.vmware.com/0iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.softwareok.com/?Freeware/Find.Same.Images.OK/Historycmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-/W3C/DTDvV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EA5000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C2C4000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CB54000.00000002.00000001.01000000.00000009.sdmpfalse
                              high
                              https://plerukilo0.site:443.dllt;lvHost_v4.exe, 00000008.00000003.3087124152.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3094364331.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3097354681.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3092450440.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3095891609.00000000004F4000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.softwareok.com/?Freeware/Find.Same.Images.OKcmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.softwareok.de/?Download=Find.Same.Images.OKcmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtdvV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002EA5000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C2C4000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CB54000.00000002.00000001.01000000.00000009.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/soap/envelope/vV5EOx0ipU.exe, 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmpfalse
                                    high
                                    http://www.vmware.com/0/iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://plerukilo0.site/lvHost_v4.exe, 00000008.00000002.3098687914.00000000004B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://plerukilo0.site/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdp=4L0lvHost_v4.exe, 00000008.00000002.3098687914.000000000050E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://epscd.catcert.net/crl/ec-acc.crl0.vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.???.xx/?search=%siScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.symauth.com/cps0(iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://plerukilo0.site:443/jaron-rush-documentary-debuts-monday-night-on-metro-sports?ms7qd64jdhcdplvHost_v4.exe, 00000008.00000003.3079480723.00000000004E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://epscd2.catcert.net/crl/ec-acc.crl0vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.softwareok.de/?Freeware/Find.Same.Images.OKcmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://plerukilo0.site:443lvHost_v4.exe, 00000008.00000003.3094364331.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3097354681.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3092450440.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3082273805.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3095891609.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3084116335.00000000004F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.catcert.net/verarrelvV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.catcert.cat/verCIT-10iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.symauth.com/rpa00iScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://plerukilo0.site:443Q:lvHost_v4.exe, 00000008.00000003.3080820458.00000000004F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.softwareok.deiScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://plerukilo0.site:443/lvHost_v4.exe, 00000008.00000003.3087124152.00000000004F4000.00000004.00000020.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000003.3084116335.00000000004F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.info-zip.org/iScrPaint.exe, 00000002.00000002.2697973370.000000000924E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.0000000005054000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.000000000271D000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.catcert.cat/descarrega/acc.crt0#vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.softwareok.de/?Freeware/Find.Same.Images.OK/Historycmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://ocsp.catcert.cat0vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2680878060.00000000006C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.softwareok.com/?Download=Find.Same.Images.OKcmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://bugreports.qt-project.org/QHttpNetworkConnectionChannel::_q_receiveReply()vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C1EC000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CA7C000.00000002.00000001.01000000.00000009.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.surfok.de/cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://bugreports.qt-project.org/vV5EOx0ipU.exe, 00000001.00000003.2662688127.0000000002855000.00000004.00000020.00020000.00000000.sdmp, iScrPaint.exe, 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmp, iScrPaint.exe, 00000003.00000002.2771280269.000000006C1EC000.00000002.00000001.01000000.00000009.sdmp, iScrPaint.exe, 00000009.00000002.3139544420.000000006CA7C000.00000002.00000001.01000000.00000009.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.softwareok.comiScrPaint.exe, 00000002.00000002.2697973370.00000000092A4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, lvHost_v4.exe, 00000008.00000000.2926710967.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, lvHost_v4.exe, 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      No contacted IP infos
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1586716
                                                      Start date and time:2025-01-09 14:42:10 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 9m 47s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:18
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:1
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:vV5EOx0ipU.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:c0aed7042e2ac3344c4ccc0bd7d5b04825538f1302074b021f80afdca8747668.exe
                                                      Detection:MAL
                                                      Classification:mal100.expl.evad.winEXE@20/15@2/0
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 53%
                                                      • Number of executed functions: 58
                                                      • Number of non-executed functions: 277
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 52.149.20.212
                                                      • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • VT rate limit hit for: vV5EOx0ipU.exe
                                                      TimeTypeDescription
                                                      08:44:07API Interceptor2x Sleep call for process: cmd.exe modified
                                                      08:44:18API Interceptor40x Sleep call for process: lvHost_v4.exe modified
                                                      14:44:02AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITF055.tmp
                                                      14:44:16AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BackupFirefox.lnk
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\AppData\Local\Temp\lvHost_v4.exe8Rmoal0v85.exeGet hashmaliciousUnknownBrowse
                                                        cLm7ThwEvh.msiGet hashmaliciousUnknownBrowse
                                                          LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                            w3245.exeGet hashmaliciousUnknownBrowse
                                                              w3245.exeGet hashmaliciousUnknownBrowse
                                                                9mauyKC3JW.exeGet hashmaliciousUnknownBrowse
                                                                  ATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                                    ATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                                      upgrade.htaGet hashmaliciousDarkVision RatBrowse
                                                                        MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                                                          C:\Users\user\AppData\Local\Temp\iScrPaint.exeRechnung736258.pdf.lnkGet hashmaliciousLummaCBrowse
                                                                            de7s.txt.ps1Get hashmaliciousLummaCBrowse
                                                                              ofsetvideofre.click.ps1Get hashmaliciousLummaCBrowse
                                                                                NPKpnpi8wd.exeGet hashmaliciousUnknownBrowse
                                                                                  Process:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):5745707
                                                                                  Entropy (8bit):7.729428227492773
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:4Y1ahq3GSXMkFRInYBulYIEBWFT3ndlF+WF874Ct2cYpYYgB4sKLAdXxP2:SmGSXXIyu2zBe3nEK+k9+Lqt4Y
                                                                                  MD5:56D7C212B5739AB6E1E8493588C4C6D7
                                                                                  SHA1:FA33DB00945FBE7745190503EF9723519B2B859C
                                                                                  SHA-256:617FF84AAC33912F4538E23D8CF9A5DF37EC28705E30EC17F096B1AEF580F76F
                                                                                  SHA-512:A771A52CF3E5464120F722C96032C25A26E728271B462FEDD54C37AF4E1A97323E4D8289C7F24AFF43AAA3ABFCB197E4E1B598B422EFD21CF8BB2047173629CB
                                                                                  Malicious:false
                                                                                  Preview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{..==..'1..z.......9;..&5..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..zn..di..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^
                                                                                  Process:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):5745707
                                                                                  Entropy (8bit):7.729428174551588
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:HY1ahq3GSXMkFRInYBulYIEBWFT3ndlF+WF874Ct2cYpYYgB4sKLAdXxP2:nmGSXXIyu2zBe3nEK+k9+Lqt4Y
                                                                                  MD5:7F704FA8167312E1154048CA4ED8AC6D
                                                                                  SHA1:3C3333DEA49BC28FF36792FC9F6AB674B4C594BD
                                                                                  SHA-256:0CC423E4F74D8D61E2D77AD8101E73110B85D5566F0B034401B0978B70DC51F1
                                                                                  SHA-512:99D060FC893A46E0DC8DFB4FA5C5BA4B6BD7C44F2041593485D72ECE93BCB9431A6F00DBFF018983C01AE93951A12797F89F0783FB80EC4AF343FA4E2D2EC7B5
                                                                                  Malicious:false
                                                                                  Preview:..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..U^...........7..;-.. ...::..'...5,...;......3,..'...5,..$^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^...0..=?...;..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^...,.. ;..'*..7;..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^.......{..==..'1..z.......9;..&5..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..zn..di..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^
                                                                                  Process:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):5745707
                                                                                  Entropy (8bit):7.729428008802699
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:9Y1ahq3GSXMkFRInYBulYIEBWFT3ndlF+WF874Ct2cYpYYgB4sKLAdXxP2:tmGSXXIyu2zBe3nEK+k9+Lqt4Y
                                                                                  MD5:1449AC3E2D89DF3303DE847E49368A3C
                                                                                  SHA1:B900BE5ADFFD790B230727C0DEDEC0EB7597DF4D
                                                                                  SHA-256:89B951E267EC7C44A32C77120D763E83327510E725D67ACA3FCEC864395C7275
                                                                                  SHA-512:B78700DC602F2BDFD2D406BCBF8EBCDF76CD9FA2B34F99530FBC41C4E7BBFD4915347176A634B9A9E50B74AFB5525E16F63F3D79DC4828B8E2DCE23E285805C8
                                                                                  Malicious:false
                                                                                  Preview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{..==..'1..z.......9;..&5..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..zn..di..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^..T^
                                                                                  Process:C:\Users\user\Desktop\vV5EOx0ipU.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):7994880
                                                                                  Entropy (8bit):6.703469580004814
                                                                                  Encrypted:false
                                                                                  SSDEEP:196608:639zxBBmYeZ1bU8Blc/OwDlcXus9n0SJsv6tWKFdu9CZ:Ozx6YeZ1bTBlc/OwDlitJsv6tWKFdu9C
                                                                                  MD5:4B208AEE511C0FFEB6BADA9615E24AF0
                                                                                  SHA1:87ACCC4F47F037F7C9C4AA340D0B1ECB13D0A00F
                                                                                  SHA-256:233567F86B706B7026E6B6D0C0B58AF434A925743D14DA86CD7E4FB95A7380E7
                                                                                  SHA-512:6ED9DEE7B407590C5EF43D2B4163CA14AAA16004A1E4158C1CEA35D744EFAB6CA93C31EB2622C6A8C5CFCFDC290F57E0EF63608ED106A4AEE751FB319D6EF22F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 13%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............uF.uF.uFs..F.uF...F..uF.c.F.uF.c.F.uF.tF..uF...F..uF...F.uF...F.uF...F.uF...F.uF...F.uFRich.uF........................PE..L...A..R...........!.....^U..@%.......J......pU...............................z......nz...@..........................vq......Tq.......t.......................t..E...wU..............................gn.@............pU.D............................text...`]U......^U................. ..`.rdata..+....pU......bU.............@..@.data...H.....q..z...lq.............@....unwanted.....t.......s.............@..@.rsrc.........t.......s.............@..@.reloc........t.......s.............@..B........................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\vV5EOx0ipU.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):60580
                                                                                  Entropy (8bit):4.548043343389377
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:RYxlZFSbjKuvdm+o5Y1JFjngRbSOW7apXMTJMKfFDCnv86OuRSMhO05ZtYCh1O2q:Ocj3e1eMKps7Ou1htZrh1S
                                                                                  MD5:759049AC234EBFBA85BED51DD876BCB4
                                                                                  SHA1:C263C8334FD5C3006364BC7E7CE95DD362CC868E
                                                                                  SHA-256:BE08C5A07DA545376818F317BB55BF704ECA95E7D2F503F1A462660AA9B6A904
                                                                                  SHA-512:BBD090DD2A1F27179904DDD958148BE82C536F5CD25FF3032D8A98C3DC641D346F3418566827A45B0B6A9DF034747F7AA637BCA20E568395066A0F86553C8784
                                                                                  Malicious:false
                                                                                  Preview:...RF...MB.p..`.bk.^.e.Igy...PdD.Z....f..HV...f^e..s.L..V...`c..j....k`n..XqEQ.IIEhC.vv..c...wOwO...yX.nmvgQg.q.qNeb`.Ge...H...Vp.AQ..G.Dks.Sl....voy.....a.D.o...bDxxE.t..D..Ut..DW_.aK.Ec.ipn..[.m..PQ...B.[.X.o...J..RrRv.L..].\..s....rR....`^...[n....c.^....R]..X..Qa..M.yChlB.l......_.....QWO...Qu.p.F..^gL.Z..Js.....U.I.....C...g...Q..^..kR.AIt....Ap..e.J.JibTSl..sr.p...pe.l\T.u.v_.[..I....JORDxe...r.....Jbf\.t...JvKKQaN.XE]..r...R.v..y.\.wF`...FE^.f.po[.uXyVWLj....L.V..Ho_..A.EeZME...V.C_.p....L.St[.N..Js..OyO....F.oZ......jwds...OaHEe.ge.Fl...pn......b.oE.KH..._K....apxAem....hqSG..]..Lf.Jw.w...LYG....Mp.mp..Y....Ip.T...[qqnd....my.ARk...j....Yr.sT..Uy.X....JF...n.cw.[PJ..J.......GOmI..GF.HQWeExG..a.....qFJ.splf.].djhwV.u...t_.cTR.Owy.^jH.OH....u..QfGsv.o`.ll.k...e..wumX..yMMBd_k....bqf.`.^N.A..]o[AnJHv.K.GDE.`........f..wb.UdC.WKj.tsW...KXZU..x...rmo..^.O......U..N.b.`.NE......L.R.D.c.U..[t...O...wK..a.e...e.Ewc...J.JQQOo...e.o.T.....O......fj.oIY..q.uSu.x...Cffn.Mp.P\.r.w..OE..w.O.
                                                                                  Process:C:\Users\user\Desktop\vV5EOx0ipU.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1909504
                                                                                  Entropy (8bit):6.730805689885005
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
                                                                                  MD5:098AC4621EE0E855E0710710736C2955
                                                                                  SHA1:CE7B88657C3449D5D05591314AAA43BD3E32BDAA
                                                                                  SHA-256:46AFBF1CBD2E1B5E108C133D4079FADDC7347231B0C48566FD967A3070745E7F
                                                                                  SHA-512:3042785B81BD18B641F0A2B5D8AEC8EF86F9BF1269421FB96D1DB35A913E744EAFF16D9DA7A02C8001435D59BEFB9F26BC0BBFA6E794811ABF4282ED68B185FE
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: Rechnung736258.pdf.lnk, Detection: malicious, Browse
                                                                                  • Filename: de7s.txt.ps1, Detection: malicious, Browse
                                                                                  • Filename: ofsetvideofre.click.ps1, Detection: malicious, Browse
                                                                                  • Filename: NPKpnpi8wd.exe, Detection: malicious, Browse
                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...s..d..................................... ....@...........................!..................@......................P....@...F......8................;......8"...................................................L...............................text............................... ..`.itext..P........................... ..`.data........ ......................@....bss.....g...............................idata...F...@...H..................@....edata..P...........................@..@.tls....L................................rdata..............................@..@.reloc..8".......$..................@..B.rsrc...8............*..............@..@....................."..............@..@........................................................
                                                                                  Process:C:\Users\user\Desktop\vV5EOx0ipU.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):4617077
                                                                                  Entropy (8bit):7.960198767058773
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:LkDHIjqSnvbYjvvxOtX8BD1WkZmTn4Uof9XnE1hlDE:G8vAhcNcG49XnEdDE
                                                                                  MD5:B94E5D29D3B971702DAA46E1DB419154
                                                                                  SHA1:A62D23DDED2A6FE2351DC57434B31B0488DE8D1C
                                                                                  SHA-256:5ACE4891083344F091D45BDDEB8DE52E4AD022E6041F1B146526FA70E2D44F76
                                                                                  SHA-512:3EDE06F7DD3294D659E5489FF1DAD3482E0A7A8A45340D0E9387E72579E87091BEF8C091F7F6410E51ABE5F0A904C9C0AF1555543D1325C7AC3D29317A716182
                                                                                  Malicious:false
                                                                                  Preview:.]...F.Z...N..[.N.A..F...sr..oCg.qPN..p.B.jRMl.........p.P.....tqA.np.J._.s.HDS..y..Q....y..m..k.q..a...U.\.DE.^.\....hj.P....D.s..SyO\...^..`...Yf...H.I[.E.....V^.s\.D..V.o....EqIq...._.TA.[..B.B.P.q..j...]qc[..aIi..LUg.[...OF.w.BBA^.Pn.JX.cw[.l.e.........q.[.O...UktM\.BIvf..b..Z..LD...VRmjR..psKpO.\.duIF.X^..o.aMv...HxdlJgTK.^..S.EOb.C....UvfeVpq.Fr...U.y....ORfUIJ..A..l.`RS.[nS.....[..uWs...d..Y.P...^.....N.t.l..d.SJM..[^.Innewt....m.A..Mgc..u...pjb[NN...`.].V._Rp.TX.n.X...\o.VO.L..x.._..sg..w.e.L...f...F`aPAV.....D...KV.NOm[siu......V]....A.RD.g.....PQjh.d.k.^.M.G\....i...W.....[r...Zt...I...PlX.e....f..Oe...Md.......CmRG..e...ucx.u.J.HsVc...nX...........i...rj...CS]L.i...].SO..Fm...C...NS.[s..........h..b..gI.oWq..`.P.......M.o..J.grC..RS.QG.pR...s[.b.RC....I....oV..iGE.fW]wT...aaC..sC`.Vh.f.c..a.d..luo.jm...is.....Mr....K.......UvbY.....T.g.....qrR.d.g..O.iv...l.SN..[..Pt.VltC..p.[....vfl.or.ew......K.Sk.al.[.Q.wqx.IyhL..\..A....dJ.\.k.L.xp.B...ac.c...A.Nj...Z\Ja.Z.\W.MCUh[qJw.d`
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2364728
                                                                                  Entropy (8bit):6.606009669324617
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi
                                                                                  MD5:967F4470627F823F4D7981E511C9824F
                                                                                  SHA1:416501B096DF80DDC49F4144C3832CF2CADB9CB2
                                                                                  SHA-256:B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                                                                                  SHA-512:8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: 8Rmoal0v85.exe, Detection: malicious, Browse
                                                                                  • Filename: cLm7ThwEvh.msi, Detection: malicious, Browse
                                                                                  • Filename: LVkAi4PBv6.exe, Detection: malicious, Browse
                                                                                  • Filename: w3245.exe, Detection: malicious, Browse
                                                                                  • Filename: w3245.exe, Detection: malicious, Browse
                                                                                  • Filename: 9mauyKC3JW.exe, Detection: malicious, Browse
                                                                                  • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                                  • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                                  • Filename: upgrade.hta, Detection: malicious, Browse
                                                                                  • Filename: MiJZ3z4t5K.exe, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:<..To..To..To.:.o..To...o..To.:9o..To.:.o..To.:/o..To..Uoe.To...o|.To...o..To...o..To...o..ToRich..To................PE..d...^.?e..........#......H.....................@..............................%.....h.$.....................................................XW..,........q...p..$h....#.8)......................................(....................`...............................text...RG.......H.................. ..`.rdata..R/...`...0...L..............@..@.data................|..............@....pdata..$h...p...j..................@..@Shared...............p..............@....tls.................x..............@....rsrc....q.......r...z..............@..@................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2648576
                                                                                  Entropy (8bit):6.732410609526973
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:SaHV/KjMHPo5YAYW3z+z2Mf9mQea+N5nXlb73J62RBOx0j4W3+F8cI:fcjD0WCMnMs
                                                                                  MD5:ACBA1EB2F3E31969467015C7D15A7657
                                                                                  SHA1:D1E37796661BC41BDC89DBEEDC872025C5889889
                                                                                  SHA-256:CFF6DEB6E4856A1046E624D0D178E7F706B32F588978435CD89C1F4C6AFE154E
                                                                                  SHA-512:C86ED87E5F2B0BCDE86DC0AD740FF3E4AE34EB2270E2AEF6A0F08F42DC1714BAF23688ED8812E932AB3FFD5054E7B761FE17683955970E198F33A95F3358D89F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....JS..................%..V(..f..W..........@.............................P/......(...`... ...................................................... /.8.....'..j...........0/.............................@.'.(...................p................................text...(.%.......%.................`..`.data.........%.......%.............@....rdata..p.....'.......&.............@..@.pdata...j....'..l....'.............@..@.xdata...R... (..T....'.............@..@.bss....`e....(..........................idata...............J(.............@....CRT....0...../......P(.............@....tls........../......R(.............@....rsrc...8.... /......T(.............@..@.reloc.......0/......V(.............@..Bgsiu.........@/......Z(.............@...................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 9 12:43:45 2025, mtime=Thu Jan 9 12:43:45 2025, atime=Sat Dec 21 11:24:54 2024, length=1909504, window=hide
                                                                                  Category:dropped
                                                                                  Size (bytes):916
                                                                                  Entropy (8bit):4.995123071544681
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:8NvA1B64ESPe8Chh9bY//AtQMPKjLI2G+0xWt129AjAgHZ7iwJvn92IzVmV:8m08aakPK3PGCt12KA0VB92IzVm
                                                                                  MD5:EC975B9EFEB2A1DEA1E34DD2D870A491
                                                                                  SHA1:6770593EC0E9BA7903E3EDB4E44CD87951DD10EB
                                                                                  SHA-256:2382BAFCB1A79FC2248D2EA8305B550FAF47F0BBE1C47AB055FE853A31444C70
                                                                                  SHA-512:7D2EBEA1953CF4B2E4153455FAF2BEF4C2A00EB53C5854A9FA99B132C132E3F9C3E041C88DC33BB11987BF81C9EC43BCC987E6650159FB1934FDC742A3E83EC3
                                                                                  Malicious:false
                                                                                  Preview:L..................F.... ...m..b....7..b.../.V.S...#........................:..DG..Yr?.D..U..k0.&...&......X..)......e.b.......b......t...CFSF..1.....EW.`..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.`)Zcm............................F.A.p.p.D.a.t.a...B.V.1.....)Zwm..Roaming.@......EW.`)Zxm..........................D.Y.R.o.a.m.i.n.g.....d.1.....)Zwm..BGSYST~1..L......)Zwm)Zxm...........................W .b.g.s.y.s.t.e.m._.t.e.s.t.....h.2..#...Y.c .ISCRPA~1.EXE..L......)Zwm)Zwm....p.........................i.S.c.r.P.a.i.n.t...e.x.e.......i...............-.......h............A.......C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe..).....\.....\.R.o.a.m.i.n.g.\.b.g.s.y.s.t.e.m._.t.e.s.t.\.i.S.c.r.P.a.i.n.t...e.x.e.`.......X.......376483...........hT..CrF.f4... .7@y.zc...,...E...hT..CrF.f4... .7@y.zc...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                  Process:C:\Windows\SysWOW64\cmd.exe
                                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2648576
                                                                                  Entropy (8bit):6.732410609526973
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:SaHV/KjMHPo5YAYW3z+z2Mf9mQea+N5nXlb73J62RBOx0j4W3+F8cI:fcjD0WCMnMs
                                                                                  MD5:ACBA1EB2F3E31969467015C7D15A7657
                                                                                  SHA1:D1E37796661BC41BDC89DBEEDC872025C5889889
                                                                                  SHA-256:CFF6DEB6E4856A1046E624D0D178E7F706B32F588978435CD89C1F4C6AFE154E
                                                                                  SHA-512:C86ED87E5F2B0BCDE86DC0AD740FF3E4AE34EB2270E2AEF6A0F08F42DC1714BAF23688ED8812E932AB3FFD5054E7B761FE17683955970E198F33A95F3358D89F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....JS..................%..V(..f..W..........@.............................P/......(...`... ...................................................... /.8.....'..j...........0/.............................@.'.(...................p................................text...(.%.......%.................`..`.data.........%.......%.............@....rdata..p.....'.......&.............@..@.pdata...j....'..l....'.............@..@.xdata...R... (..T....'.............@..@.bss....`e....(..........................idata...............J(.............@....CRT....0...../......P(.............@....tls........../......R(.............@....rsrc...8.... /......T(.............@..@.reloc.......0/......V(.............@..Bgsiu.........@/......Z(.............@...................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\iScrPaint.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):7994880
                                                                                  Entropy (8bit):6.703469580004814
                                                                                  Encrypted:false
                                                                                  SSDEEP:196608:639zxBBmYeZ1bU8Blc/OwDlcXus9n0SJsv6tWKFdu9CZ:Ozx6YeZ1bTBlc/OwDlitJsv6tWKFdu9C
                                                                                  MD5:4B208AEE511C0FFEB6BADA9615E24AF0
                                                                                  SHA1:87ACCC4F47F037F7C9C4AA340D0B1ECB13D0A00F
                                                                                  SHA-256:233567F86B706B7026E6B6D0C0B58AF434A925743D14DA86CD7E4FB95A7380E7
                                                                                  SHA-512:6ED9DEE7B407590C5EF43D2B4163CA14AAA16004A1E4158C1CEA35D744EFAB6CA93C31EB2622C6A8C5CFCFDC290F57E0EF63608ED106A4AEE751FB319D6EF22F
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 13%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............uF.uF.uFs..F.uF...F..uF.c.F.uF.c.F.uF.tF..uF...F..uF...F.uF...F.uF...F.uF...F.uF...F.uFRich.uF........................PE..L...A..R...........!.....^U..@%.......J......pU...............................z......nz...@..........................vq......Tq.......t.......................t..E...wU..............................gn.@............pU.D............................text...`]U......^U................. ..`.rdata..+....pU......bU.............@..@.data...H.....q..z...lq.............@....unwanted.....t.......s.............@..@.rsrc.........t.......s.............@..@.reloc........t.......s.............@..B........................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\iScrPaint.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):60580
                                                                                  Entropy (8bit):4.548043343389377
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:RYxlZFSbjKuvdm+o5Y1JFjngRbSOW7apXMTJMKfFDCnv86OuRSMhO05ZtYCh1O2q:Ocj3e1eMKps7Ou1htZrh1S
                                                                                  MD5:759049AC234EBFBA85BED51DD876BCB4
                                                                                  SHA1:C263C8334FD5C3006364BC7E7CE95DD362CC868E
                                                                                  SHA-256:BE08C5A07DA545376818F317BB55BF704ECA95E7D2F503F1A462660AA9B6A904
                                                                                  SHA-512:BBD090DD2A1F27179904DDD958148BE82C536F5CD25FF3032D8A98C3DC641D346F3418566827A45B0B6A9DF034747F7AA637BCA20E568395066A0F86553C8784
                                                                                  Malicious:false
                                                                                  Preview:...RF...MB.p..`.bk.^.e.Igy...PdD.Z....f..HV...f^e..s.L..V...`c..j....k`n..XqEQ.IIEhC.vv..c...wOwO...yX.nmvgQg.q.qNeb`.Ge...H...Vp.AQ..G.Dks.Sl....voy.....a.D.o...bDxxE.t..D..Ut..DW_.aK.Ec.ipn..[.m..PQ...B.[.X.o...J..RrRv.L..].\..s....rR....`^...[n....c.^....R]..X..Qa..M.yChlB.l......_.....QWO...Qu.p.F..^gL.Z..Js.....U.I.....C...g...Q..^..kR.AIt....Ap..e.J.JibTSl..sr.p...pe.l\T.u.v_.[..I....JORDxe...r.....Jbf\.t...JvKKQaN.XE]..r...R.v..y.\.wF`...FE^.f.po[.uXyVWLj....L.V..Ho_..A.EeZME...V.C_.p....L.St[.N..Js..OyO....F.oZ......jwds...OaHEe.ge.Fl...pn......b.oE.KH..._K....apxAem....hqSG..]..Lf.Jw.w...LYG....Mp.mp..Y....Ip.T...[qqnd....my.ARk...j....Yr.sT..Uy.X....JF...n.cw.[PJ..J.......GOmI..GF.HQWeExG..a.....qFJ.splf.].djhwV.u...t_.cTR.Owy.^jH.OH....u..QfGsv.o`.ll.k...e..wumX..yMMBd_k....bqf.`.^N.A..]o[AnJHv.K.GDE.`........f..wb.UdC.WKj.tsW...KXZU..x...rmo..^.O......U..N.b.`.NE......L.R.D.c.U..[t...O...wK..a.e...e.Ewc...J.JQQOo...e.o.T.....O......fj.oIY..q.uSu.x...Cffn.Mp.P\.r.w..OE..w.O.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\iScrPaint.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1909504
                                                                                  Entropy (8bit):6.730805689885005
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:GpjwrP6yVgBd39sUUzFti4aTotmIT3SxLmNKbx:GpjwrP6yKTOUmi4aTo1NK9
                                                                                  MD5:098AC4621EE0E855E0710710736C2955
                                                                                  SHA1:CE7B88657C3449D5D05591314AAA43BD3E32BDAA
                                                                                  SHA-256:46AFBF1CBD2E1B5E108C133D4079FADDC7347231B0C48566FD967A3070745E7F
                                                                                  SHA-512:3042785B81BD18B641F0A2B5D8AEC8EF86F9BF1269421FB96D1DB35A913E744EAFF16D9DA7A02C8001435D59BEFB9F26BC0BBFA6E794811ABF4282ED68B185FE
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...s..d..................................... ....@...........................!..................@......................P....@...F......8................;......8"...................................................L...............................text............................... ..`.itext..P........................... ..`.data........ ......................@....bss.....g...............................idata...F...@...H..................@....edata..P...........................@..@.tls....L................................rdata..............................@..@.reloc..8".......$..................@..B.rsrc...8............*..............@..@....................."..............@..@........................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\iScrPaint.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):4617077
                                                                                  Entropy (8bit):7.960198767058773
                                                                                  Encrypted:false
                                                                                  SSDEEP:98304:LkDHIjqSnvbYjvvxOtX8BD1WkZmTn4Uof9XnE1hlDE:G8vAhcNcG49XnEdDE
                                                                                  MD5:B94E5D29D3B971702DAA46E1DB419154
                                                                                  SHA1:A62D23DDED2A6FE2351DC57434B31B0488DE8D1C
                                                                                  SHA-256:5ACE4891083344F091D45BDDEB8DE52E4AD022E6041F1B146526FA70E2D44F76
                                                                                  SHA-512:3EDE06F7DD3294D659E5489FF1DAD3482E0A7A8A45340D0E9387E72579E87091BEF8C091F7F6410E51ABE5F0A904C9C0AF1555543D1325C7AC3D29317A716182
                                                                                  Malicious:false
                                                                                  Preview:.]...F.Z...N..[.N.A..F...sr..oCg.qPN..p.B.jRMl.........p.P.....tqA.np.J._.s.HDS..y..Q....y..m..k.q..a...U.\.DE.^.\....hj.P....D.s..SyO\...^..`...Yf...H.I[.E.....V^.s\.D..V.o....EqIq...._.TA.[..B.B.P.q..j...]qc[..aIi..LUg.[...OF.w.BBA^.Pn.JX.cw[.l.e.........q.[.O...UktM\.BIvf..b..Z..LD...VRmjR..psKpO.\.duIF.X^..o.aMv...HxdlJgTK.^..S.EOb.C....UvfeVpq.Fr...U.y....ORfUIJ..A..l.`RS.[nS.....[..uWs...d..Y.P...^.....N.t.l..d.SJM..[^.Innewt....m.A..Mgc..u...pjb[NN...`.].V._Rp.TX.n.X...\o.VO.L..x.._..sg..w.e.L...f...F`aPAV.....D...KV.NOm[siu......V]....A.RD.g.....PQjh.d.k.^.M.G\....i...W.....[r...Zt...I...PlX.e....f..Oe...Md.......CmRG..e...ucx.u.J.HsVc...nX...........i...rj...CS]L.i...].SO..Fm...C...NS.[s..........h..b..gI.oWq..`.P.......M.o..J.grC..RS.QG.pR...s[.b.RC....I....oV..iGE.fW]wT...aaC..sC`.Vh.f.c..a.d..luo.jm...is.....Mr....K.......UvbY.....T.g.....qrR.d.g..O.iv...l.SN..[..Pt.VltC..p.[....vfl.or.ew......K.Sk.al.[.Q.wqx.IyhL..\..A....dJ.\.k.L.xp.B...ac.c...A.Nj...Z\Ja.Z.\W.MCUh[qJw.d`
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.998248057889052
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:vV5EOx0ipU.exe
                                                                                  File size:7'480'499 bytes
                                                                                  MD5:bdb812b2a360c206c5ab9de2acd75435
                                                                                  SHA1:2c888c5ef480d02aa6a972906c29d2c498fd430a
                                                                                  SHA256:c0aed7042e2ac3344c4ccc0bd7d5b04825538f1302074b021f80afdca8747668
                                                                                  SHA512:7765c60c7aeff0c9530c58cf52fa8c3cb37b9435fbd9da08dface95ffb82cc118ae6f0bf1463741f9a76a66d4ccdcc798d82de9eb19360c486a30e50819fb713
                                                                                  SSDEEP:196608:Vpb+BS6/kf/XRVp9J5oIV8eUFZcCdsUFzEW4NUafxRpgci71zKrJr6h9:Vpq7knTJ5os8jgksEgfNL5dEKrJ2n
                                                                                  TLSH:A67633167AD3843BD313023A488A6DEAB8BCEF714700545657AB3D172EBB723E11E9D1
                                                                                  File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@.................................R.r......................................P..........H_.................
                                                                                  Icon Hash:a9e8e8e9e8e8e8a9
                                                                                  Entrypoint:0x411def
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:
                                                                                  Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                                                  Instruction
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push FFFFFFFFh
                                                                                  push 00414C50h
                                                                                  push 00411F80h
                                                                                  mov eax, dword ptr fs:[00000000h]
                                                                                  push eax
                                                                                  mov dword ptr fs:[00000000h], esp
                                                                                  sub esp, 68h
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [ebp-18h], esp
                                                                                  xor ebx, ebx
                                                                                  mov dword ptr [ebp-04h], ebx
                                                                                  push 00000002h
                                                                                  call dword ptr [00413184h]
                                                                                  pop ecx
                                                                                  or dword ptr [00419924h], FFFFFFFFh
                                                                                  or dword ptr [00419928h], FFFFFFFFh
                                                                                  call dword ptr [00413188h]
                                                                                  mov ecx, dword ptr [0041791Ch]
                                                                                  mov dword ptr [eax], ecx
                                                                                  call dword ptr [0041318Ch]
                                                                                  mov ecx, dword ptr [00417918h]
                                                                                  mov dword ptr [eax], ecx
                                                                                  mov eax, dword ptr [00413190h]
                                                                                  mov eax, dword ptr [eax]
                                                                                  mov dword ptr [00419920h], eax
                                                                                  call 00007FE1FCDA09C2h
                                                                                  cmp dword ptr [00417710h], ebx
                                                                                  jne 00007FE1FCDA08AEh
                                                                                  push 00411F78h
                                                                                  call dword ptr [00413194h]
                                                                                  pop ecx
                                                                                  call 00007FE1FCDA0994h
                                                                                  push 00417048h
                                                                                  push 00417044h
                                                                                  call 00007FE1FCDA097Fh
                                                                                  mov eax, dword ptr [00417914h]
                                                                                  mov dword ptr [ebp-6Ch], eax
                                                                                  lea eax, dword ptr [ebp-6Ch]
                                                                                  push eax
                                                                                  push dword ptr [00417910h]
                                                                                  lea eax, dword ptr [ebp-64h]
                                                                                  push eax
                                                                                  lea eax, dword ptr [ebp-70h]
                                                                                  push eax
                                                                                  lea eax, dword ptr [ebp-60h]
                                                                                  push eax
                                                                                  call dword ptr [0041319Ch]
                                                                                  push 00417040h
                                                                                  push 00417000h
                                                                                  call 00007FE1FCDA094Ch
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x15f48.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x1a0000x15f480x1600058c3a21bc434e97296ae9e0d1765d247False0.6494584517045454data7.1334992117723095IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x1a2800xaf05PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia1.00046869768999
                                                                                  RT_ICON0x251880x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0RussianRussia0.2670642418516769
                                                                                  RT_ICON0x293b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RussianRussia0.3201244813278008
                                                                                  RT_ICON0x2b9580x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0RussianRussia0.3479289940828402
                                                                                  RT_ICON0x2d3c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RussianRussia0.3897748592870544
                                                                                  RT_ICON0x2e4680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RussianRussia0.4389344262295082
                                                                                  RT_ICON0x2edf00x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0RussianRussia0.45290697674418606
                                                                                  RT_ICON0x2f4a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RussianRussia0.6338652482269503
                                                                                  RT_GROUP_ICON0x2f9100x76dataRussianRussia0.7203389830508474
                                                                                  RT_VERSION0x2f9880x350dataEnglishUnited States0.47523584905660377
                                                                                  RT_MANIFEST0x2fcd80x270ASCII text, with very long lines (624), with no line terminatorsEnglishUnited States0.5144230769230769
                                                                                  DLLImport
                                                                                  COMCTL32.dll
                                                                                  KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                                                  USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                                                  GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                                                  SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                                                  ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                                                  OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                                                  MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  RussianRussia
                                                                                  EnglishUnited States
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 9, 2025 14:43:52.342576981 CET5245753192.168.2.12162.159.36.2
                                                                                  Jan 9, 2025 14:43:52.348476887 CET5352457162.159.36.2192.168.2.12
                                                                                  Jan 9, 2025 14:43:52.348664045 CET5245753192.168.2.12162.159.36.2
                                                                                  Jan 9, 2025 14:43:52.354182005 CET5352457162.159.36.2192.168.2.12
                                                                                  Jan 9, 2025 14:43:52.808123112 CET5245753192.168.2.12162.159.36.2
                                                                                  Jan 9, 2025 14:43:52.813426971 CET5352457162.159.36.2192.168.2.12
                                                                                  Jan 9, 2025 14:43:52.813669920 CET5245753192.168.2.12162.159.36.2
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 9, 2025 14:43:52.341939926 CET5353264162.159.36.2192.168.2.12
                                                                                  Jan 9, 2025 14:43:52.817553043 CET53500011.1.1.1192.168.2.12
                                                                                  Jan 9, 2025 14:44:27.158468962 CET5888353192.168.2.121.1.1.1
                                                                                  Jan 9, 2025 14:44:27.167355061 CET53588831.1.1.1192.168.2.12
                                                                                  Jan 9, 2025 14:45:14.092813015 CET5783453192.168.2.121.1.1.1
                                                                                  Jan 9, 2025 14:45:14.102183104 CET53578341.1.1.1192.168.2.12
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Jan 9, 2025 14:44:27.158468962 CET192.168.2.121.1.1.10x1fc5Standard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                                  Jan 9, 2025 14:45:14.092813015 CET192.168.2.121.1.1.10x6108Standard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Jan 9, 2025 14:44:27.167355061 CET1.1.1.1192.168.2.120x1fc5Name error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 9, 2025 14:45:14.102183104 CET1.1.1.1192.168.2.120x6108Name error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false

                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:1
                                                                                  Start time:08:43:41
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\Desktop\vV5EOx0ipU.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\vV5EOx0ipU.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:7'480'499 bytes
                                                                                  MD5 hash:BDB812B2A360C206C5AB9DE2ACD75435
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000003.2662688127.000000000268B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:08:43:44
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Local\Temp\iScrPaint.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\iScrPaint.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'909'504 bytes
                                                                                  MD5 hash:098AC4621EE0E855E0710710736C2955
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.2697973370.00000000094EA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000002.00000000.2666457888.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\iScrPaint.exe, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 3%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:08:43:45
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  Imagebase:0x400000
                                                                                  File size:1'909'504 bytes
                                                                                  MD5 hash:098AC4621EE0E855E0710710736C2955
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 3%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:08:43:47
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                  Imagebase:0x1f0000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.2990081458.000000000509D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:08:43:47
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff704000000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:8
                                                                                  Start time:08:44:10
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                                                                                  Imagebase:0x140000000
                                                                                  File size:2'364'728 bytes
                                                                                  MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.3099430526.0000000002766000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Reputation:moderate
                                                                                  Has exited:true

                                                                                  Target ID:9
                                                                                  Start time:08:44:24
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'909'504 bytes
                                                                                  MD5 hash:098AC4621EE0E855E0710710736C2955
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:08:44:24
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                  Imagebase:0x1f0000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.3190555284.000000000523C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.3190324611.0000000003250000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:11
                                                                                  Start time:08:44:24
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff704000000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:15
                                                                                  Start time:08:44:36
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Roaming\bgsystem_test\iScrPaint.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:1'909'504 bytes
                                                                                  MD5 hash:098AC4621EE0E855E0710710736C2955
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:16
                                                                                  Start time:08:44:37
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                  Imagebase:0x1f0000
                                                                                  File size:236'544 bytes
                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.3459279888.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:17
                                                                                  Start time:08:44:37
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff704000000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Has exited:true

                                                                                  Target ID:18
                                                                                  Start time:08:44:54
                                                                                  Start date:09/01/2025
                                                                                  Path:C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Users\user\AppData\Local\Temp\lvHost_v4.exe
                                                                                  Imagebase:0x140000000
                                                                                  File size:2'364'728 bytes
                                                                                  MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000012.00000002.3565366108.00000000025DC000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:17.4%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:25.9%
                                                                                    Total number of Nodes:1474
                                                                                    Total number of Limit Nodes:20
                                                                                    execution_graph 9006 410e7f 9007 410e9a 9006->9007 9008 410eb5 9007->9008 9010 40f42d 9007->9010 9011 40f445 free 9010->9011 9012 40f437 9010->9012 9013 4024e7 46 API calls 9011->9013 9012->9011 9014 40f456 9012->9014 9013->9014 9014->9008 10837 411a2d _EH_prolog 10840 4117b9 10837->10840 10839 411a61 10841 4117e9 10840->10841 10842 4117cd 10840->10842 10841->10839 10842->10841 10860 40e58f 10842->10860 10845 40e58f 47 API calls 10846 411801 10845->10846 10846->10841 10847 40e58f 47 API calls 10846->10847 10848 411813 10847->10848 10848->10841 10849 40e58f 47 API calls 10848->10849 10850 411828 10849->10850 10850->10841 10866 40e9b5 10850->10866 10852 41183d 10852->10841 10872 41168a 10852->10872 10854 411a16 10882 40ea88 10854->10882 10857 41164e _CxxThrowException 10859 4118a0 10857->10859 10858 4115a9 memmove _CxxThrowException 10858->10859 10859->10841 10859->10854 10859->10857 10859->10858 10876 4116c7 10859->10876 10861 40e59e 10860->10861 10862 40e5b9 10861->10862 10886 40e556 10861->10886 10862->10841 10862->10845 10865 4024c4 46 API calls 10865->10862 10867 40e9c4 10866->10867 10868 40e9de 10867->10868 10890 40e964 10867->10890 10868->10852 10871 4024c4 46 API calls 10871->10868 10873 411693 10872->10873 10875 4116c4 10873->10875 10894 40e63c 10873->10894 10875->10859 10877 411726 10876->10877 10878 4116df 10876->10878 10879 411709 10877->10879 10881 40e63c _CxxThrowException 10877->10881 10878->10879 10880 40e63c _CxxThrowException 10878->10880 10879->10859 10880->10879 10881->10879 10883 40ea8d 10882->10883 10884 40eaa0 10883->10884 10901 40e9f7 10883->10901 10884->10841 10889 401b1f VirtualFree 10886->10889 10888 40e561 10888->10865 10889->10888 10893 401b1f VirtualFree 10890->10893 10892 40e96e 10892->10871 10893->10892 10897 40e5d3 10894->10897 10898 40e5e1 10897->10898 10899 40e5e5 10897->10899 10898->10873 10899->10898 10900 40e60a _CxxThrowException 10899->10900 10900->10898 10902 40ea0b 10901->10902 10903 40ea30 10902->10903 10904 40ea1c memmove 10902->10904 10903->10883 10904->10903 8238 4096c7 _EH_prolog 8252 4096fa 8238->8252 8239 40971c 8240 409827 8273 40118a 8240->8273 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8252 8243 409851 8246 40985e ??2@YAPAXI 8243->8246 8244 40983c 8324 409425 8244->8324 8247 409878 8246->8247 8253 4098c2 8247->8253 8254 409925 ??2@YAPAXI 8247->8254 8258 409530 3 API calls 8247->8258 8260 409425 ctype 3 API calls 8247->8260 8262 4099a2 8247->8262 8267 409a65 8247->8267 8283 409fb4 8247->8283 8287 408ea4 8247->8287 8330 409c13 ??2@YAPAXI 8247->8330 8332 409f49 8247->8332 8248 40969d 8 API calls 8248->8252 8250 40e959 VirtualFree ??3@YAXPAX free free ctype 8250->8252 8252->8239 8252->8240 8252->8242 8252->8248 8252->8250 8317 4095b7 8252->8317 8321 409403 8252->8321 8327 409530 8253->8327 8254->8247 8258->8247 8260->8247 8263 409530 3 API calls 8262->8263 8264 4099c7 8263->8264 8265 409425 ctype 3 API calls 8264->8265 8265->8239 8269 409530 3 API calls 8267->8269 8270 409a84 8269->8270 8271 409425 ctype 3 API calls 8270->8271 8271->8239 8274 401198 GetDiskFreeSpaceExW 8273->8274 8275 4011ee SendMessageW 8273->8275 8274->8275 8276 4011b0 8274->8276 8277 4011d6 8275->8277 8276->8275 8278 401f9d 19 API calls 8276->8278 8277->8243 8277->8244 8279 4011c9 8278->8279 8280 407717 25 API calls 8279->8280 8281 4011cf 8280->8281 8281->8277 8282 4011e7 8281->8282 8282->8275 8284 409fdd 8283->8284 8336 409dff 8284->8336 8610 40aef3 8287->8610 8290 408ec1 8290->8247 8292 408fd5 8628 408b7c 8292->8628 8293 408f0d ??2@YAPAXI 8302 408ef5 8293->8302 8295 408f31 ??2@YAPAXI 8295->8302 8302->8292 8302->8293 8302->8295 8671 40cdb8 ??2@YAPAXI 8302->8671 8318 4095c6 8317->8318 8320 4095cc 8317->8320 8318->8252 8319 4095e2 _CxxThrowException 8319->8318 8320->8318 8320->8319 8322 40e8e2 4 API calls 8321->8322 8323 40940b 8322->8323 8323->8252 8325 40e8da ctype 3 API calls 8324->8325 8326 409433 8325->8326 8328 408963 ctype 3 API calls 8327->8328 8329 40953b 8328->8329 8331 409c45 8330->8331 8331->8247 8334 409f4e 8332->8334 8333 409f75 8333->8247 8334->8333 8335 409cde 110 API calls 8334->8335 8335->8334 8339 409e04 8336->8339 8337 409e3a 8337->8247 8339->8337 8340 409cde 8339->8340 8341 409cf8 8340->8341 8345 401626 8341->8345 8408 40db1f 8341->8408 8342 409d2c 8342->8339 8346 401642 8345->8346 8352 401638 8345->8352 8411 40a62f _EH_prolog 8346->8411 8348 40166f 8455 40eca9 8348->8455 8349 401411 2 API calls 8351 401688 8349->8351 8353 401962 ??3@YAXPAX 8351->8353 8354 40169d 8351->8354 8352->8342 8358 40eca9 VariantClear 8353->8358 8437 401329 8354->8437 8357 4016a8 8441 401454 8357->8441 8358->8352 8361 401362 2 API calls 8362 4016c7 ??3@YAXPAX 8361->8362 8367 4016d9 8362->8367 8394 401928 ??3@YAXPAX 8362->8394 8364 40eca9 VariantClear 8364->8352 8365 4016fa 8366 40eca9 VariantClear 8365->8366 8368 401702 ??3@YAXPAX 8366->8368 8367->8365 8369 401764 8367->8369 8382 401725 8367->8382 8368->8348 8372 4017a2 8369->8372 8373 401789 8369->8373 8370 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8370->8371 8371->8348 8375 4017c4 GetLocalTime SystemTimeToFileTime 8372->8375 8376 4017aa 8372->8376 8374 40eca9 VariantClear 8373->8374 8377 401791 ??3@YAXPAX 8374->8377 8375->8376 8378 4017e1 8376->8378 8379 4017f8 8376->8379 8376->8382 8377->8348 8459 403354 lstrlenW 8378->8459 8446 40301a GetFileAttributesW 8379->8446 8382->8370 8384 401934 GetLastError 8384->8394 8385 401818 ??2@YAPAXI 8387 401824 8385->8387 8386 40192a 8386->8384 8483 40db53 8387->8483 8390 40190f 8393 40eca9 VariantClear 8390->8393 8391 40185f GetLastError 8486 4012f7 8391->8486 8393->8394 8394->8364 8395 401871 8396 403354 86 API calls 8395->8396 8399 40187f ??3@YAXPAX 8395->8399 8397 4018cc 8396->8397 8397->8399 8401 40db53 2 API calls 8397->8401 8400 40189c 8399->8400 8402 40eca9 VariantClear 8400->8402 8403 4018f1 8401->8403 8404 4018aa ??3@YAXPAX 8402->8404 8405 4018f5 GetLastError 8403->8405 8406 401906 ??3@YAXPAX 8403->8406 8404->8348 8405->8399 8406->8390 8602 40da56 8408->8602 8412 40a738 8411->8412 8413 40a66a 8411->8413 8414 40a687 8412->8414 8415 40a73d 8412->8415 8413->8414 8416 40a704 8413->8416 8417 40a679 8413->8417 8423 40a6ad 8414->8423 8515 40a3b0 8414->8515 8420 40a747 8415->8420 8422 40a699 8415->8422 8424 40a6f2 8415->8424 8416->8423 8489 40e69c 8416->8489 8418 40a67e 8417->8418 8417->8424 8427 40a684 8418->8427 8435 40a6b2 8418->8435 8420->8424 8420->8435 8422->8423 8503 40ed59 8422->8503 8498 40ecae 8423->8498 8511 40ed34 8424->8511 8426 40a71a 8492 40eced 8426->8492 8427->8414 8427->8422 8433 40eca9 VariantClear 8434 40166b 8433->8434 8434->8348 8434->8349 8435->8423 8507 40ed79 8435->8507 8438 401340 8437->8438 8439 40112b 2 API calls 8438->8439 8440 40134b 8439->8440 8440->8357 8442 4012f7 2 API calls 8441->8442 8443 401462 8442->8443 8530 4013e2 8443->8530 8445 40146d 8445->8361 8447 403037 8446->8447 8453 401804 8446->8453 8448 403048 8447->8448 8449 40303b SetLastError 8447->8449 8450 403051 8448->8450 8452 40305f FindFirstFileW 8448->8452 8448->8453 8449->8453 8533 402fed 8450->8533 8452->8450 8454 403072 FindClose CompareFileTime 8452->8454 8453->8384 8453->8385 8453->8386 8454->8450 8454->8453 8456 40ec65 8455->8456 8457 40ec86 VariantClear 8456->8457 8458 40ec9d 8456->8458 8457->8352 8458->8352 8460 4024fc 2 API calls 8459->8460 8461 403375 8460->8461 8462 40112b 2 API calls 8461->8462 8465 403385 8461->8465 8462->8465 8464 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8466 4033e8 8464->8466 8467 4033f2 8464->8467 8465->8464 8474 403477 8465->8474 8574 401986 CreateDirectoryW 8465->8574 8468 40301a 22 API calls 8466->8468 8469 401986 4 API calls 8467->8469 8479 4033f8 ??3@YAXPAX 8467->8479 8468->8467 8482 403405 8469->8482 8470 4034a7 8471 407776 55 API calls 8470->8471 8477 4034b1 ??3@YAXPAX 8471->8477 8472 40340a 8580 407776 8472->8580 8474->8470 8474->8479 8475 40346b ??3@YAXPAX 8480 4034bc 8475->8480 8476 40341d memcpy 8476->8482 8477->8480 8479->8480 8480->8382 8481 401986 4 API calls 8481->8482 8482->8472 8482->8475 8482->8476 8482->8481 8599 40db3c 8483->8599 8487 40112b 2 API calls 8486->8487 8488 401311 8487->8488 8488->8395 8490 4012f7 2 API calls 8489->8490 8491 40e6a9 8490->8491 8491->8426 8519 40ecd7 8492->8519 8495 40ed12 8496 40a726 ??3@YAXPAX 8495->8496 8497 40ed17 _CxxThrowException 8495->8497 8496->8423 8497->8496 8522 40ec65 8498->8522 8500 40ecba 8501 40a7b2 8500->8501 8502 40ecbe memcpy 8500->8502 8501->8433 8502->8501 8504 40ed62 8503->8504 8505 40ed67 8503->8505 8506 40ecd7 VariantClear 8504->8506 8505->8423 8506->8505 8508 40ed82 8507->8508 8509 40ed87 8507->8509 8510 40ecd7 VariantClear 8508->8510 8509->8423 8510->8509 8512 40ed42 8511->8512 8513 40ed3d 8511->8513 8512->8423 8514 40ecd7 VariantClear 8513->8514 8514->8512 8516 40a3c2 8515->8516 8517 40a3de 8516->8517 8526 40eda0 8516->8526 8517->8423 8520 40eca9 VariantClear 8519->8520 8521 40ecdf SysAllocString 8520->8521 8521->8495 8521->8496 8523 40ec6d 8522->8523 8524 40ec86 VariantClear 8523->8524 8525 40ec9d 8523->8525 8524->8500 8525->8500 8527 40edae 8526->8527 8528 40eda9 8526->8528 8527->8517 8529 40ecd7 VariantClear 8528->8529 8529->8527 8531 401398 2 API calls 8530->8531 8532 4013f2 8531->8532 8532->8445 8539 402c86 8533->8539 8535 402ff6 8536 403017 8535->8536 8537 402ffb GetLastError 8535->8537 8536->8453 8538 403006 8537->8538 8538->8453 8540 402c93 GetFileAttributesW 8539->8540 8541 402c8f 8539->8541 8542 402ca4 8540->8542 8543 402ca9 8540->8543 8541->8535 8542->8535 8544 402cc7 8543->8544 8545 402cad SetFileAttributesW 8543->8545 8550 402b79 8544->8550 8547 402cc3 8545->8547 8548 402cba DeleteFileW 8545->8548 8547->8535 8548->8535 8551 4024fc 2 API calls 8550->8551 8552 402b90 8551->8552 8553 40254d 2 API calls 8552->8553 8554 402b9d FindFirstFileW 8553->8554 8555 402c55 SetFileAttributesW 8554->8555 8570 402bbf 8554->8570 8557 402c60 RemoveDirectoryW 8555->8557 8558 402c78 ??3@YAXPAX 8555->8558 8556 401329 2 API calls 8556->8570 8557->8558 8559 402c6d ??3@YAXPAX 8557->8559 8560 402c80 8558->8560 8559->8560 8560->8535 8562 40254d 2 API calls 8562->8570 8563 402c24 SetFileAttributesW 8563->8558 8567 402c2d DeleteFileW 8563->8567 8564 402bef lstrcmpW 8565 402c05 lstrcmpW 8564->8565 8566 402c38 FindNextFileW 8564->8566 8565->8566 8565->8570 8568 402c4e FindClose 8566->8568 8566->8570 8567->8570 8568->8555 8569 402b79 2 API calls 8569->8570 8570->8556 8570->8558 8570->8562 8570->8563 8570->8564 8570->8566 8570->8569 8571 401429 8570->8571 8572 401398 2 API calls 8571->8572 8573 401433 8572->8573 8573->8570 8575 4019c7 8574->8575 8576 401997 GetLastError 8574->8576 8575->8465 8577 4019b1 GetFileAttributesW 8576->8577 8579 4019a6 8576->8579 8577->8575 8577->8579 8578 4019a7 SetLastError 8578->8465 8579->8575 8579->8578 8581 401f9d 19 API calls 8580->8581 8582 40778a wvsprintfW 8581->8582 8583 407859 8582->8583 8584 4077ab GetLastError FormatMessageW 8582->8584 8587 4076a8 25 API calls 8583->8587 8585 4077d9 FormatMessageW 8584->8585 8586 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8584->8586 8585->8583 8585->8586 8591 4076a8 8586->8591 8590 407865 8587->8590 8590->8479 8592 407715 ??3@YAXPAX LocalFree 8591->8592 8593 4076b7 8591->8593 8592->8590 8594 40661a 2 API calls 8593->8594 8595 4076c6 IsWindow 8594->8595 8596 4076ef 8595->8596 8597 4076dd IsBadReadPtr 8595->8597 8598 4073d1 21 API calls 8596->8598 8597->8596 8598->8592 8600 40db1f 2 API calls 8599->8600 8601 401857 8600->8601 8601->8390 8601->8391 8607 40d985 8602->8607 8605 40da65 CreateFileW 8606 40da8a 8605->8606 8606->8342 8608 40d98f CloseHandle 8607->8608 8609 40d99a 8607->8609 8608->8609 8609->8605 8609->8606 8611 40af0c 8610->8611 8626 408ebd 8610->8626 8611->8626 8701 40ac7a 8611->8701 8613 40af3f 8614 40ac7a 7 API calls 8613->8614 8615 40b0cb 8613->8615 8619 40af96 8614->8619 8617 40e959 ctype 4 API calls 8615->8617 8616 40afbd 8708 40e959 8616->8708 8617->8626 8619->8615 8619->8616 8620 40b043 8621 40e959 ctype 4 API calls 8620->8621 8624 40b07f 8621->8624 8622 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8623 40afc6 8622->8623 8623->8620 8623->8622 8625 40e959 ctype 4 API calls 8624->8625 8625->8626 8626->8290 8627 4065ea InitializeCriticalSection 8626->8627 8627->8302 8720 4086f0 8628->8720 8672 40cdc7 8671->8672 8673 408761 4 API calls 8672->8673 8674 40cdde 8673->8674 8674->8302 8702 40e8da ctype 3 API calls 8701->8702 8703 40ac86 8702->8703 8712 40e811 8703->8712 8705 40aca2 8705->8613 8706 409403 4 API calls 8707 40ac90 8706->8707 8707->8705 8707->8706 8709 40e93b 8708->8709 8710 40e8da ctype 3 API calls 8709->8710 8711 40e943 ??3@YAXPAX 8710->8711 8711->8623 8713 40e8a5 8712->8713 8714 40e824 8712->8714 8713->8707 8715 40e833 _CxxThrowException 8714->8715 8716 40e863 ??2@YAPAXI 8714->8716 8717 40e895 ??3@YAXPAX 8714->8717 8715->8714 8716->8714 8718 40e879 memcpy 8716->8718 8717->8713 8718->8717 8721 40e8da ctype 3 API calls 8720->8721 8722 4086f8 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408700 8723->8724 8725 40e8da ctype 3 API calls 8724->8725 8726 408708 8725->8726 9015 40dace 9018 40daac 9015->9018 9021 40da8f 9018->9021 9022 40da56 2 API calls 9021->9022 9023 40daa9 9022->9023 9005 40dadc ReadFile 9024 411def __set_app_type __p__fmode __p__commode 9025 411e5e 9024->9025 9026 411e72 9025->9026 9027 411e66 __setusermatherr 9025->9027 9036 411f66 _controlfp 9026->9036 9027->9026 9029 411e77 _initterm __getmainargs _initterm 9030 411ecb GetStartupInfoA 9029->9030 9032 411eff GetModuleHandleA 9030->9032 9037 4064af _EH_prolog 9032->9037 9036->9029 9040 404faa 9037->9040 9345 401b37 GetModuleHandleW CreateWindowExW 9040->9345 9043 404fdc 9044 40648e MessageBoxA 9043->9044 9046 404ff6 9043->9046 9045 4064a5 exit _XcptFilter 9044->9045 9047 401411 2 API calls 9046->9047 9048 40502d 9047->9048 9049 401411 2 API calls 9048->9049 9050 405035 9049->9050 9348 403e23 9050->9348 9055 40254d 2 API calls 9056 405073 9055->9056 9357 402a69 9056->9357 9058 40507c 9371 403d71 9058->9371 9061 40509b _wtol 9063 4050b1 9061->9063 9376 404405 9063->9376 9064 4050d6 9065 403d71 6 API calls 9064->9065 9066 4050e1 9065->9066 9067 4050e7 9066->9067 9068 405118 9066->9068 9533 404996 9067->9533 9069 405130 GetModuleFileNameW 9068->9069 9071 40112b 2 API calls 9068->9071 9072 405151 9069->9072 9073 405142 9069->9073 9071->9069 9078 403d71 6 API calls 9072->9078 9075 407776 55 API calls 9073->9075 9074 4050ee ??3@YAXPAX 9551 403e70 9074->9551 9083 4050ec 9075->9083 9077 4050ff ??3@YAXPAX ??3@YAXPAX 9077->9045 9090 405173 9078->9090 9079 4052d5 9080 401362 2 API calls 9079->9080 9081 4052e5 9080->9081 9082 401362 2 API calls 9081->9082 9087 4052f2 9082->9087 9083->9074 9084 4051fa 9084->9083 9085 40522a 9084->9085 9089 405213 _wtol 9084->9089 9086 403d71 6 API calls 9085->9086 9095 405289 9086->9095 9088 40538d ??2@YAPAXI 9087->9088 9091 401329 2 API calls 9087->9091 9097 405399 9088->9097 9089->9085 9090->9079 9090->9083 9090->9084 9090->9085 9094 401429 2 API calls 9090->9094 9092 405327 9091->9092 9093 401329 2 API calls 9092->9093 9099 40533d 9093->9099 9094->9090 9095->9079 9096 404594 2 API calls 9095->9096 9098 4052ba 9096->9098 9100 4053cf 9097->9100 9104 407776 55 API calls 9097->9104 9098->9079 9102 401362 2 API calls 9098->9102 9103 401362 2 API calls 9099->9103 9401 4025ae 9100->9401 9102->9079 9106 405367 9103->9106 9104->9100 9108 401f9d 19 API calls 9106->9108 9107 4025ae 2 API calls 9110 4053f6 9107->9110 9109 40536e 9108->9109 9111 40254d 2 API calls 9109->9111 9112 4025ae 2 API calls 9110->9112 9113 405377 9111->9113 9114 4053fe 9112->9114 9113->9088 9404 404e3f 9114->9404 9119 40546f 9121 405534 9119->9121 9124 403d71 6 API calls 9119->9124 9120 402844 10 API calls 9122 405441 9120->9122 9123 40e8da ctype 3 API calls 9121->9123 9122->9119 9127 407776 55 API calls 9122->9127 9125 40553c 9123->9125 9126 405493 9124->9126 9128 405573 9125->9128 9582 403093 9125->9582 9126->9121 9134 40549d 9126->9134 9129 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9127->9129 9131 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9128->9131 9132 40557c 9128->9132 9129->9119 9131->9074 9131->9083 9136 405588 wsprintfW 9132->9136 9137 4055ed 9132->9137 9143 401411 2 API calls 9132->9143 9144 401329 ??2@YAPAXI ??3@YAXPAX 9132->9144 9147 401f9d 19 API calls 9132->9147 9616 402f6c ??2@YAPAXI 9132->9616 9622 402425 ??3@YAXPAX ??3@YAXPAX 9132->9622 9134->9131 9556 404cbc 9134->9556 9135 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9138 4054f5 9135->9138 9139 401411 2 API calls 9136->9139 9432 404603 9137->9432 9138->9131 9139->9132 9142 4054cc 9142->9131 9145 407776 55 API calls 9142->9145 9143->9132 9144->9132 9146 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9145->9146 9146->9138 9147->9132 9148 40584a 9149 404603 26 API calls 9148->9149 9182 40586a 9149->9182 9151 403b94 lstrlenW lstrlenW _wcsnicmp 9176 4055f6 9151->9176 9154 405933 9494 404034 9154->9494 9155 4024fc 2 API calls 9155->9182 9159 4059d8 CoInitialize 9166 40243b lstrcmpW 9159->9166 9160 40595a 9163 40243b lstrcmpW 9160->9163 9161 405935 ??3@YAXPAX 9161->9154 9165 405969 9163->9165 9164 401411 ??2@YAPAXI ??3@YAXPAX 9164->9182 9167 405979 9165->9167 9169 401f9d 19 API calls 9165->9169 9168 4059fe 9166->9168 9649 403b40 9167->9649 9170 405a12 9168->9170 9173 401329 2 API calls 9168->9173 9169->9167 9500 403b59 9170->9500 9172 401362 2 API calls 9172->9182 9173->9170 9176->9148 9176->9151 9192 4057dd _wtol 9176->9192 9208 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9176->9208 9623 40484d 9176->9623 9634 40408b 9176->9634 9178 4073d1 21 API calls 9181 40599c ctype 9178->9181 9179 401329 2 API calls 9179->9182 9180 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9180->9184 9222 405a61 9180->9222 9669 4082e9 9180->9669 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9181->9185 9182->9154 9182->9155 9182->9161 9182->9164 9182->9172 9182->9179 9187 402f6c 7 API calls 9182->9187 9491 40243b 9182->9491 9648 402425 ??3@YAXPAX ??3@YAXPAX 9182->9648 9184->9180 9185->9083 9187->9182 9189 405910 ??3@YAXPAX 9189->9182 9190 401411 2 API calls 9190->9222 9192->9176 9193 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213 405bf3 9193->9213 9194 405a9f GetKeyState 9194->9222 9195 405c6c 9197 405ca2 9195->9197 9198 405c74 9195->9198 9196 40243b lstrcmpW 9196->9222 9201 4012f7 2 API calls 9197->9201 9711 403f85 9198->9711 9202 405cb0 9201->9202 9205 403b59 15 API calls 9202->9205 9209 405cb9 9205->9209 9206 407776 55 API calls 9210 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9210 9207 401362 2 API calls 9211 405c91 ??3@YAXPAX 9207->9211 9208->9083 9212 405cca ??3@YAXPAX 9209->9212 9216 401362 2 API calls 9209->9216 9210->9213 9217 405cd9 9211->9217 9212->9217 9213->9206 9214 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213->9214 9214->9213 9215 405bcd ??3@YAXPAX 9215->9222 9216->9212 9219 405d24 9217->9219 9220 405d16 9217->9220 9218 401329 ??2@YAPAXI ??3@YAXPAX 9218->9222 9724 40786b 9219->9724 9507 404a44 9220->9507 9222->9190 9222->9193 9222->9194 9222->9195 9222->9196 9222->9213 9222->9214 9222->9215 9222->9218 9224 401429 ??2@YAPAXI ??3@YAXPAX 9222->9224 9696 407613 9222->9696 9705 407674 9222->9705 9224->9222 9225 405d20 9226 405d65 9225->9226 9730 403e0d 9225->9730 9227 404034 21 API calls 9226->9227 9229 405d77 9227->9229 9231 401411 2 API calls 9229->9231 9232 406373 9229->9232 9233 405d95 9231->9233 9234 4063f7 ctype 9232->9234 9237 40243b lstrcmpW 9232->9237 9277 405da8 9233->9277 9734 40453e 9233->9734 9236 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9234->9236 9242 40243b lstrcmpW 9234->9242 9239 406461 9236->9239 9240 406467 ??3@YAXPAX 9236->9240 9238 4063a4 9237->9238 9238->9234 9761 403f48 9238->9761 9239->9240 9241 403e70 ctype 4 API calls 9240->9241 9243 406478 ??3@YAXPAX ??3@YAXPAX 9241->9243 9245 406416 9242->9245 9243->9045 9244 401411 ??2@YAPAXI ??3@YAXPAX 9244->9277 9245->9236 9249 406423 9245->9249 9248 405dd8 9252 405de5 9248->9252 9253 4061fa ??3@YAXPAX ??3@YAXPAX 9248->9253 9250 4012f7 2 API calls 9249->9250 9255 406432 9250->9255 9251 4073d1 21 API calls 9256 4063e0 ??3@YAXPAX 9251->9256 9743 4043c6 9252->9743 9257 406312 9253->9257 9254 40243b lstrcmpW 9254->9277 9766 404aff 9255->9766 9256->9234 9260 40636a ??3@YAXPAX 9257->9260 9263 404034 21 API calls 9257->9263 9259 405e45 9265 401329 2 API calls 9259->9265 9260->9232 9268 406321 9263->9268 9269 405e4e 9265->9269 9266 4043c6 2 API calls 9267 405e0e 9266->9267 9270 401362 2 API calls 9267->9270 9751 4048ab 9268->9751 9274 403b7f 19 API calls 9269->9274 9275 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9270->9275 9272 40626b ??3@YAXPAX ??3@YAXPAX 9272->9257 9273 401329 2 API calls 9273->9277 9290 405e57 9274->9290 9278 406211 9275->9278 9279 405e41 9275->9279 9276 40633a SetCurrentDirectoryW 9280 4048ab 4 API calls 9276->9280 9277->9244 9277->9248 9277->9254 9277->9259 9277->9272 9277->9273 9281 401429 2 API calls 9277->9281 9284 403e0d 16 API calls 9278->9284 9279->9259 9282 406362 9280->9282 9283 405ee5 ??3@YAXPAX ??3@YAXPAX 9281->9283 9285 403e0d 16 API calls 9282->9285 9283->9277 9286 406216 9284->9286 9285->9260 9287 407776 55 API calls 9286->9287 9288 40621f 7 API calls 9287->9288 9289 40625e 9288->9289 9289->9272 9291 405f61 _wtol 9290->9291 9292 403bce lstrlenW lstrlenW _wcsnicmp 9290->9292 9293 406025 9290->9293 9291->9290 9292->9290 9294 406080 9293->9294 9295 40602e 9293->9295 9296 401362 2 API calls 9294->9296 9297 406053 9295->9297 9298 406034 9295->9298 9299 40607e 9296->9299 9301 401329 2 API calls 9297->9301 9300 401329 2 API calls 9298->9300 9302 40254d 2 API calls 9299->9302 9303 40603f 9300->9303 9304 406051 9301->9304 9305 406092 9302->9305 9306 40254d 2 API calls 9303->9306 9307 40243b lstrcmpW 9304->9307 9308 401411 2 API calls 9305->9308 9309 406048 9306->9309 9310 406068 9307->9310 9311 40609a 9308->9311 9312 40254d 2 API calls 9309->9312 9310->9305 9314 40254d 2 API calls 9310->9314 9313 401411 2 API calls 9311->9313 9312->9304 9315 4060a2 memset 9313->9315 9314->9299 9316 4060e1 9315->9316 9317 404594 2 API calls 9316->9317 9318 4060fe 9317->9318 9319 401329 2 API calls 9318->9319 9320 406109 9319->9320 9321 403b7f 19 API calls 9320->9321 9322 406112 9321->9322 9323 4061b1 9322->9323 9527 4021ed 9322->9527 9325 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9325 9327 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9327 9325->9257 9327->9253 9328 406150 9330 403b7f 19 API calls 9328->9330 9329 401429 2 API calls 9331 406147 9329->9331 9332 406168 ShellExecuteExW 9330->9332 9334 40254d 2 API calls 9331->9334 9335 406282 9332->9335 9336 40618c 9332->9336 9334->9328 9339 407776 55 API calls 9335->9339 9337 4061a0 CloseHandle 9336->9337 9338 406192 WaitForSingleObject 9336->9338 9748 402185 9337->9748 9338->9337 9341 40628c 9339->9341 9342 403e0d 16 API calls 9341->9342 9343 406291 9 API calls 9342->9343 9344 4062e1 9343->9344 9344->9325 9346 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9345->9346 9347 401b9f GetVersionExW 9345->9347 9346->9347 9347->9043 9347->9044 9349 40112b 2 API calls 9348->9349 9350 403e38 GetCommandLineW 9349->9350 9351 404594 9350->9351 9352 4045ce 9351->9352 9355 4045a2 9351->9355 9354 401429 2 API calls 9352->9354 9356 4045c6 9352->9356 9353 401429 2 API calls 9353->9355 9354->9352 9355->9353 9355->9356 9356->9055 9358 401411 2 API calls 9357->9358 9364 402a79 9358->9364 9359 401362 2 API calls 9360 402b6c ??3@YAXPAX 9359->9360 9360->9058 9361 402b5f 9361->9359 9363 401411 2 API calls 9363->9364 9364->9361 9364->9363 9365 401429 ??2@YAPAXI ??3@YAXPAX 9364->9365 9367 401362 2 API calls 9364->9367 9805 4025c6 9364->9805 9808 40272e 9364->9808 9365->9364 9368 402ad9 ??3@YAXPAX 9367->9368 9369 4013e2 2 API calls 9368->9369 9370 402aee ??3@YAXPAX ??3@YAXPAX 9369->9370 9370->9364 9372 403d80 9371->9372 9373 403dbd 9372->9373 9374 403d9a lstrlenW lstrlenW 9372->9374 9373->9061 9373->9063 9819 401a85 9374->9819 9377 401f47 3 API calls 9376->9377 9378 404416 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 40441d 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404429 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404435 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 404441 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 40444d 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404459 9389->9390 9391 401f9d 19 API calls 9390->9391 9392 404465 9391->9392 9393 404480 SHGetSpecialFolderPathW 9392->9393 9396 404533 #17 9392->9396 9397 401411 2 API calls 9392->9397 9398 401329 ??2@YAPAXI ??3@YAXPAX 9392->9398 9400 402f6c 7 API calls 9392->9400 9824 402425 ??3@YAXPAX ??3@YAXPAX 9392->9824 9393->9392 9394 40449a wsprintfW 9393->9394 9395 401411 2 API calls 9394->9395 9395->9392 9396->9064 9397->9392 9398->9392 9400->9392 9402 4022b0 2 API calls 9401->9402 9403 4025c2 9402->9403 9403->9107 9825 403e86 9404->9825 9406 404e56 9407 403e86 2 API calls 9406->9407 9408 404e65 9407->9408 9829 404343 9408->9829 9412 404e82 ??3@YAXPAX 9413 404343 3 API calls 9412->9413 9414 404e9d 9413->9414 9415 403ec1 2 API calls 9414->9415 9416 404ea8 ??3@YAXPAX wsprintfA 9415->9416 9845 403ef6 9416->9845 9418 404ed0 9419 403ef6 2 API calls 9418->9419 9420 404edb 9419->9420 9421 402844 9420->9421 9422 402851 9421->9422 9430 40dcfb 3 API calls 9422->9430 9423 402863 lstrlenA lstrlenA 9428 402890 9423->9428 9424 40296e 9424->9119 9424->9120 9425 40293b memmove 9425->9424 9425->9428 9426 4028db memcmp 9426->9424 9426->9428 9427 402918 memcmp 9427->9428 9428->9424 9428->9425 9428->9426 9428->9427 9431 40dcc7 GetLastError 9428->9431 9856 402640 9428->9856 9430->9423 9431->9428 9433 40243b lstrcmpW 9432->9433 9434 40461c 9433->9434 9435 40466c 9434->9435 9437 401329 2 API calls 9434->9437 9436 40243b lstrcmpW 9435->9436 9438 40468a 9436->9438 9439 404633 9437->9439 9442 40243b lstrcmpW 9438->9442 9440 401f9d 19 API calls 9439->9440 9441 40463a 9440->9441 9444 40254d 2 API calls 9441->9444 9443 4046a2 9442->9443 9446 40243b lstrcmpW 9443->9446 9445 404643 9444->9445 9447 401329 2 API calls 9445->9447 9448 4046ba 9446->9448 9449 40465c 9447->9449 9451 40243b lstrcmpW 9448->9451 9450 401f9d 19 API calls 9449->9450 9452 404663 9450->9452 9453 4046d2 9451->9453 9454 40254d 2 API calls 9452->9454 9455 4046e9 9453->9455 9456 4046d9 lstrcmpiW 9453->9456 9454->9435 9457 40243b lstrcmpW 9455->9457 9456->9455 9458 4046ff 9457->9458 9459 40243b lstrcmpW 9458->9459 9460 40472c 9459->9460 9461 404739 9460->9461 9859 403d1f 9460->9859 9463 40243b lstrcmpW 9461->9463 9467 40474d 9463->9467 9464 40476d 9465 40243b lstrcmpW 9464->9465 9472 404780 9465->9472 9467->9464 9468 40243b lstrcmpW 9467->9468 9863 403cc6 9467->9863 9468->9467 9469 4047a0 9471 40243b lstrcmpW 9469->9471 9473 4047ac 9471->9473 9472->9469 9474 40243b lstrcmpW 9472->9474 9867 403cf7 9472->9867 9475 40243b lstrcmpW 9473->9475 9474->9472 9476 4047bd 9475->9476 9477 40243b lstrcmpW 9476->9477 9478 4047ce 9477->9478 9479 4047e4 9478->9479 9480 4047db _wtol 9478->9480 9481 40243b lstrcmpW 9479->9481 9480->9479 9482 4047f0 9481->9482 9483 404800 9482->9483 9484 4047f7 _wtol 9482->9484 9485 40243b lstrcmpW 9483->9485 9484->9483 9486 40480c 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 404824 9487->9488 9489 40243b lstrcmpW 9488->9489 9490 40483c 9489->9490 9490->9176 9875 4023dd 9491->9875 9495 404045 9494->9495 9496 404088 9494->9496 9497 4012f7 2 API calls 9495->9497 9498 403b7f 19 API calls 9495->9498 9496->9159 9496->9160 9497->9495 9499 404062 SetEnvironmentVariableW ??3@YAXPAX 9498->9499 9499->9495 9499->9496 9501 40393b 7 API calls 9500->9501 9502 403b69 9501->9502 9503 4039f6 7 API calls 9502->9503 9504 403b74 9503->9504 9505 4027c7 6 API calls 9504->9505 9506 403b7a 9505->9506 9506->9180 9652 4083b6 9506->9652 9879 408676 9507->9879 9509 404a55 ??2@YAPAXI 9510 404a64 9509->9510 9524 40dcfb 3 API calls 9510->9524 9511 404a85 9881 40b2fc 9511->9881 9887 40a7de _EH_prolog 9511->9887 9512 404a95 9513 404ab3 9512->9513 9514 404a99 9512->9514 9516 404ada ??2@YAPAXI 9513->9516 9519 403354 86 API calls 9513->9519 9515 407776 55 API calls 9514->9515 9523 404aa1 9515->9523 9517 404ae6 9516->9517 9518 404aed 9516->9518 9922 404292 9517->9922 9903 40150b 9518->9903 9521 404ac6 9519->9521 9521->9516 9521->9523 9523->9225 9524->9511 9528 402200 LoadLibraryA GetProcAddress 9527->9528 9529 4021fb 9527->9529 9530 40221b 9528->9530 9531 402223 9528->9531 9529->9323 9529->9328 9529->9329 9530->9529 9531->9530 10385 4021b9 LoadLibraryA GetProcAddress 9531->10385 9534 40661a 2 API calls 9533->9534 9535 4049af 9534->9535 9536 401f9d 19 API calls 9535->9536 9537 4049bd 9536->9537 9538 4024fc 2 API calls 9537->9538 9539 4049c7 9538->9539 9540 4049fd 9539->9540 9542 40254d ??2@YAPAXI ??3@YAXPAX 9539->9542 9541 40254d 2 API calls 9540->9541 9543 404a0a 9541->9543 9542->9539 9544 401f9d 19 API calls 9543->9544 9545 404a11 9544->9545 9546 40254d 2 API calls 9545->9546 9547 404a1b 9546->9547 9548 4073d1 21 API calls 9547->9548 9549 404a30 ??3@YAXPAX 9548->9549 9550 404a41 ctype 9549->9550 9550->9083 9552 40e8da ctype 3 API calls 9551->9552 9553 403e7e 9552->9553 9554 40e8da ctype 3 API calls 9553->9554 9555 40e943 ??3@YAXPAX 9554->9555 9555->9077 9557 40db53 2 API calls 9556->9557 9558 404ce8 9557->9558 9559 404d44 9558->9559 9561 4024fc 2 API calls 9558->9561 9560 4025ae 2 API calls 9559->9560 9562 404d4c 9560->9562 9563 404cf7 9561->9563 9564 403e86 2 API calls 9562->9564 9567 404db5 ??3@YAXPAX 9563->9567 9569 403354 86 API calls 9563->9569 9565 404d59 9564->9565 9566 403ef6 2 API calls 9565->9566 9568 404d66 9566->9568 9581 404db1 9567->9581 9570 403ef6 2 API calls 9568->9570 9571 404d1b 9569->9571 9572 404d73 9570->9572 9571->9567 9574 40db53 2 API calls 9571->9574 9573 403ef6 2 API calls 9572->9573 9575 404d80 9573->9575 9576 404d37 9574->9576 9577 40dd5f 2 API calls 9575->9577 9576->9567 9578 404d3b ??3@YAXPAX 9576->9578 9579 404d94 9577->9579 9578->9559 9579->9567 9580 404d9d ??3@YAXPAX 9579->9580 9580->9581 9581->9142 9583 4025ae 2 API calls 9582->9583 9599 4030a8 9583->9599 9584 403301 9585 403344 ??3@YAXPAX 9584->9585 9586 40334e 9585->9586 9586->9128 9586->9135 9587 401411 ??2@YAPAXI ??3@YAXPAX 9587->9599 9589 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9589->9599 9590 401362 2 API calls 9591 4030f3 ??3@YAXPAX ??3@YAXPAX 9590->9591 9592 403303 9591->9592 9591->9599 10393 4029c3 9592->10393 9596 40331c ??3@YAXPAX 9596->9586 9597 4031e5 strncmp 9598 4031d0 strncmp 9597->9598 9597->9599 9598->9597 9598->9599 9599->9584 9599->9587 9599->9589 9599->9590 9599->9592 9599->9597 9600 401362 2 API calls 9599->9600 9601 402640 2 API calls 9599->9601 9604 402640 ??2@YAPAXI ??3@YAXPAX 9599->9604 9606 4023dd lstrcmpW 9599->9606 9607 402f6c 7 API calls 9599->9607 9609 403330 9599->9609 9610 4032b2 lstrcmpW 9599->9610 9614 401329 2 API calls 9599->9614 10387 402986 9599->10387 10392 402425 ??3@YAXPAX ??3@YAXPAX 9599->10392 9602 403252 ??3@YAXPAX 9600->9602 9601->9598 9603 402a69 9 API calls 9602->9603 9605 403263 lstrcmpW 9603->9605 9604->9599 9605->9599 9606->9599 9607->9599 9612 402f6c 7 API calls 9609->9612 9610->9599 9611 4032c0 lstrcmpW 9610->9611 9611->9599 9613 40333c 9612->9613 10411 402425 ??3@YAXPAX ??3@YAXPAX 9613->10411 9614->9599 9617 402f86 9616->9617 9618 402f7b 9616->9618 9620 408761 4 API calls 9617->9620 10413 402668 9618->10413 9621 402f92 9620->9621 9621->9132 9622->9132 9624 4024fc 2 API calls 9623->9624 9625 40485f 9624->9625 9626 40254d 2 API calls 9625->9626 9627 40486c 9626->9627 9628 404888 9627->9628 9629 401429 2 API calls 9627->9629 9630 40254d 2 API calls 9628->9630 9629->9627 9631 404892 9630->9631 9632 40408b 94 API calls 9631->9632 9633 40489d ??3@YAXPAX 9632->9633 9633->9176 9635 4040a2 lstrlenW 9634->9635 9636 4040ce 9634->9636 9637 401a85 4 API calls 9635->9637 9636->9176 9638 4040b8 9637->9638 9638->9635 9638->9636 9639 4040d5 9638->9639 9640 4024fc 2 API calls 9639->9640 9643 4040de 9640->9643 10418 402776 9643->10418 9644 403093 84 API calls 9645 40414c 9644->9645 9646 404156 ??3@YAXPAX ??3@YAXPAX 9645->9646 9647 40416d ??3@YAXPAX ??3@YAXPAX 9645->9647 9646->9636 9647->9636 9648->9189 9650 40661a 2 API calls 9649->9650 9651 403b48 9650->9651 9651->9178 9653 408646 9652->9653 9665 4083d5 ctype 9652->9665 9653->9184 9654 40661a 2 API calls 9654->9665 9655 40786b 23 API calls 9655->9665 9656 40243b lstrcmpW 9656->9665 9658 407674 23 API calls 9658->9665 9659 407613 23 API calls 9659->9665 9660 403b40 2 API calls 9660->9665 9661 401f9d 19 API calls 9661->9665 9662 407776 55 API calls 9662->9665 9663 403f48 4 API calls 9663->9665 9664 4073d1 21 API calls 9664->9665 9665->9653 9665->9654 9665->9655 9665->9656 9665->9658 9665->9659 9665->9660 9665->9661 9665->9662 9665->9663 9665->9664 9666 407717 25 API calls 9665->9666 9667 4073d1 21 API calls 9665->9667 10428 40744b 9665->10428 9666->9665 9668 408476 ??3@YAXPAX 9667->9668 9668->9665 9670 40243b lstrcmpW 9669->9670 9671 4082fd 9670->9671 9672 40830b 9671->9672 10432 4019f0 GetStdHandle WriteFile 9671->10432 9674 40831e 9672->9674 10433 4019f0 GetStdHandle WriteFile 9672->10433 9676 408333 9674->9676 10434 4019f0 GetStdHandle WriteFile 9674->10434 9678 408344 9676->9678 10435 4019f0 GetStdHandle WriteFile 9676->10435 9680 40243b lstrcmpW 9678->9680 9681 408351 9680->9681 9684 40835f 9681->9684 10436 4019f0 GetStdHandle WriteFile 9681->10436 9683 40243b lstrcmpW 9685 40836c 9683->9685 9684->9683 9686 40837a 9685->9686 10437 4019f0 GetStdHandle WriteFile 9685->10437 9688 40243b lstrcmpW 9686->9688 9689 408387 9688->9689 9690 408395 9689->9690 10438 4019f0 GetStdHandle WriteFile 9689->10438 9692 40243b lstrcmpW 9690->9692 9693 4083a2 9692->9693 9694 4083b2 9693->9694 10439 4019f0 GetStdHandle WriteFile 9693->10439 9694->9180 9697 407636 9696->9697 9698 407658 9697->9698 9699 40764b 9697->9699 10443 407186 9698->10443 10440 407154 9699->10440 9702 407653 9703 4073d1 21 API calls 9702->9703 9704 407671 9703->9704 9704->9222 9706 407689 9705->9706 9707 40716d 2 API calls 9706->9707 9708 407694 9707->9708 9709 4073d1 21 API calls 9708->9709 9710 4076a5 9709->9710 9710->9222 9712 401411 2 API calls 9711->9712 9713 403f96 9712->9713 9714 402535 2 API calls 9713->9714 9715 403f9f GetTempPathW 9714->9715 9716 403fb8 9715->9716 9721 403fcf 9715->9721 9717 402535 2 API calls 9716->9717 9718 403fc3 GetTempPathW 9717->9718 9718->9721 9719 402535 2 API calls 9720 403ff2 wsprintfW 9719->9720 9720->9721 9721->9719 9722 404009 GetFileAttributesW 9721->9722 9723 40402d 9721->9723 9722->9721 9722->9723 9723->9207 9725 40787e 9724->9725 10449 40719f 9725->10449 9728 4073d1 21 API calls 9729 4078b3 9728->9729 9729->9225 9731 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9730->9731 9732 403e16 9730->9732 9731->9226 9733 402c86 16 API calls 9732->9733 9733->9731 9735 40243b lstrcmpW 9734->9735 9736 40455d 9735->9736 9737 404592 9736->9737 9738 401329 2 API calls 9736->9738 9737->9277 9739 40456c 9738->9739 9740 403b7f 19 API calls 9739->9740 9741 404572 9740->9741 9741->9737 9742 401429 2 API calls 9741->9742 9742->9737 9744 4012f7 2 API calls 9743->9744 9745 4043d4 9744->9745 9746 40254d 2 API calls 9745->9746 9747 4043df 9746->9747 9747->9266 9749 4021a9 9748->9749 9750 40218e LoadLibraryA GetProcAddress 9748->9750 9749->9323 9750->9749 9752 401411 2 API calls 9751->9752 9759 4048bc 9752->9759 9753 401329 2 API calls 9753->9759 9754 40494e 9755 404988 ??3@YAXPAX 9754->9755 9757 4048ab 3 API calls 9754->9757 9755->9276 9756 401429 2 API calls 9756->9759 9758 404985 9757->9758 9758->9755 9759->9753 9759->9754 9759->9756 9760 40243b lstrcmpW 9759->9760 9760->9759 9762 40661a 2 API calls 9761->9762 9763 403f50 9762->9763 9764 401411 2 API calls 9763->9764 9765 403f5e 9764->9765 9765->9251 9767 404cb1 ??3@YAXPAX 9766->9767 9769 404b15 9766->9769 9770 404cb7 9767->9770 9768 404b29 GetDriveTypeW 9768->9767 9771 404b55 9768->9771 9769->9767 9769->9768 9770->9236 9772 403f85 6 API calls 9771->9772 9773 404b63 CreateFileW 9772->9773 9774 404b89 9773->9774 9775 404c7b ??3@YAXPAX ??3@YAXPAX 9773->9775 9776 401411 2 API calls 9774->9776 9775->9770 9777 404b92 9776->9777 9778 401329 2 API calls 9777->9778 9779 404b9f 9778->9779 9780 40254d 2 API calls 9779->9780 9781 404bad 9780->9781 9782 4013e2 2 API calls 9781->9782 9783 404bb9 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bc7 9784->9785 9786 40254d 2 API calls 9785->9786 9787 404bd4 9786->9787 9788 4013e2 2 API calls 9787->9788 9789 404be0 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bed 9790->9791 9792 40254d 2 API calls 9791->9792 9793 404bf6 9792->9793 9794 4013e2 2 API calls 9793->9794 9795 404c02 9794->9795 9796 40254d 2 API calls 9795->9796 9797 404c0b 9796->9797 9798 402776 3 API calls 9797->9798 9799 404c1d WriteFile ??3@YAXPAX CloseHandle 9798->9799 9800 404c4b 9799->9800 9801 404c8c 9799->9801 9800->9801 9802 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9800->9802 9803 402c86 16 API calls 9801->9803 9802->9775 9804 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9770 9814 4022b0 9805->9814 9809 401411 2 API calls 9808->9809 9810 40273a 9809->9810 9811 402772 9810->9811 9812 402535 2 API calls 9810->9812 9811->9364 9813 402757 MultiByteToWideChar 9812->9813 9813->9811 9815 4022ea 9814->9815 9816 4022be ??2@YAPAXI 9814->9816 9815->9364 9816->9815 9818 4022cf 9816->9818 9817 4022e2 ??3@YAXPAX 9817->9815 9818->9817 9818->9818 9820 401ae3 9819->9820 9821 401a97 9819->9821 9820->9373 9821->9820 9822 401abc CharUpperW CharUpperW 9821->9822 9822->9821 9823 401af3 CharUpperW CharUpperW 9822->9823 9823->9820 9824->9392 9826 403e9e 9825->9826 9827 4022b0 2 API calls 9826->9827 9828 403eac 9827->9828 9828->9406 9830 40435e 9829->9830 9831 404375 9830->9831 9832 40436a 9830->9832 9833 4025ae 2 API calls 9831->9833 9849 4025f6 9832->9849 9834 40437e 9833->9834 9836 4022b0 2 API calls 9834->9836 9838 404387 9836->9838 9837 404373 9841 403ec1 9837->9841 9838->9838 9839 4025f6 2 API calls 9838->9839 9840 4043b5 ??3@YAXPAX 9839->9840 9840->9837 9842 403ecd 9841->9842 9844 403ede 9841->9844 9843 4022b0 2 API calls 9842->9843 9843->9844 9844->9412 9846 403f06 9845->9846 9846->9846 9852 4022fc 9846->9852 9848 403f13 9848->9418 9850 4022b0 2 API calls 9849->9850 9851 402610 9850->9851 9851->9837 9853 402340 9852->9853 9854 402310 9852->9854 9853->9848 9855 4022b0 2 API calls 9854->9855 9855->9853 9857 4022fc 2 API calls 9856->9857 9858 40264a 9857->9858 9858->9428 9860 403d3d 9859->9860 9871 403c63 9860->9871 9864 403cd3 9863->9864 9865 403c63 _wtol 9864->9865 9866 403cf4 9865->9866 9866->9467 9868 403d04 9867->9868 9869 403c63 _wtol 9868->9869 9870 403d1c 9869->9870 9870->9472 9872 403c6d 9871->9872 9873 403c88 _wtol 9872->9873 9874 403cc1 9872->9874 9873->9872 9874->9461 9876 4023e8 9875->9876 9877 402411 9876->9877 9878 4023f4 lstrcmpW 9876->9878 9877->9182 9878->9876 9878->9877 9880 408679 9879->9880 9880->9509 9882 40b30d 9881->9882 9886 40dcfb 3 API calls 9882->9886 9883 40b321 9884 40b331 9883->9884 9927 40b163 9883->9927 9884->9512 9886->9883 9888 40a7fe 9887->9888 9889 40b2fc 11 API calls 9888->9889 9890 40a823 9889->9890 9891 40a845 9890->9891 9892 40a82c 9890->9892 9955 40cc59 _EH_prolog 9891->9955 9958 40a3fe 9892->9958 9904 40151e 9903->9904 9905 401329 2 API calls 9904->9905 9906 40152b 9905->9906 9907 401429 2 API calls 9906->9907 9908 401534 CreateThread 9907->9908 9909 401563 9908->9909 9910 401568 WaitForSingleObject 9908->9910 10379 40129c 9908->10379 9911 40786b 23 API calls 9909->9911 9912 401585 9910->9912 9913 4015b7 9910->9913 9911->9910 9916 4015a3 9912->9916 9919 401594 9912->9919 9914 4015b3 9913->9914 9915 4015bf GetExitCodeThread 9913->9915 9914->9523 9917 4015d6 9915->9917 9918 407776 55 API calls 9916->9918 9917->9914 9917->9919 9920 401605 SetLastError 9917->9920 9918->9914 9919->9914 9921 407776 55 API calls 9919->9921 9920->9919 9921->9914 9923 401411 2 API calls 9922->9923 9924 4042ab 9923->9924 9925 401411 2 API calls 9924->9925 9926 4042b7 9925->9926 9926->9518 9940 40f0b6 9927->9940 9929 40b192 9929->9884 9930 40b17e 9930->9929 9943 40adc3 9930->9943 9933 40b297 ??3@YAXPAX 9933->9929 9934 40b2a2 ??3@YAXPAX 9934->9929 9936 40b27a memmove 9937 40b1d9 9936->9937 9937->9933 9937->9934 9937->9936 9938 40b2ac memcpy 9937->9938 9939 40dcfb 3 API calls 9938->9939 9939->9934 9951 40f06b 9940->9951 9944 40add0 9943->9944 9945 40ae0d memcpy 9943->9945 9946 40add5 ??2@YAPAXI 9944->9946 9947 40adfb 9944->9947 9945->9937 9948 40adfd ??3@YAXPAX 9946->9948 9949 40ade5 memmove 9946->9949 9947->9948 9948->9945 9949->9948 9952 40f0af 9951->9952 9953 40f07d 9951->9953 9952->9930 9953->9952 9954 40dcc7 GetLastError 9953->9954 9954->9953 9966 40c9fc 9955->9966 10362 40a28e 9958->10362 9988 40a0bf 9966->9988 10111 40a030 9988->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a039 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a041 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a049 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a051 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a059 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a061 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a06b 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a073 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a080 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a088 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a095 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a09d 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0aa 10136->10137 10138 40e8da ctype 3 API calls 10137->10138 10139 40a0b2 10138->10139 10363 40e8da ctype 3 API calls 10362->10363 10364 40a29c 10363->10364 10380 4012a5 10379->10380 10381 4012b8 10379->10381 10380->10381 10382 4012a7 Sleep 10380->10382 10383 4012f1 10381->10383 10384 4012e3 EndDialog 10381->10384 10382->10380 10384->10383 10386 4021db 10385->10386 10386->9530 10388 4025ae 2 API calls 10387->10388 10389 402992 10388->10389 10390 4029be 10389->10390 10391 402640 2 API calls 10389->10391 10390->9599 10391->10389 10392->9599 10394 4029d2 10393->10394 10395 4029de 10393->10395 10412 4019f0 GetStdHandle WriteFile 10394->10412 10397 4025ae 2 API calls 10395->10397 10401 4029e8 10397->10401 10398 4029d9 10410 402425 ??3@YAXPAX ??3@YAXPAX 10398->10410 10399 402a13 10400 40272e 3 API calls 10399->10400 10402 402a25 10400->10402 10401->10399 10405 402640 2 API calls 10401->10405 10403 402a33 10402->10403 10404 402a47 10402->10404 10406 407776 55 API calls 10403->10406 10407 407776 55 API calls 10404->10407 10405->10401 10408 402a42 ??3@YAXPAX ??3@YAXPAX 10406->10408 10407->10408 10408->10398 10410->9596 10411->9585 10412->10398 10414 4012f7 2 API calls 10413->10414 10415 402676 10414->10415 10416 4012f7 2 API calls 10415->10416 10417 402682 10416->10417 10417->9617 10419 4025ae 2 API calls 10418->10419 10420 402785 10419->10420 10421 4027c1 10420->10421 10424 402628 10420->10424 10421->9644 10425 402634 10424->10425 10426 40263a WideCharToMultiByte 10424->10426 10427 4022b0 2 API calls 10425->10427 10426->10421 10427->10426 10429 407456 10428->10429 10430 40745b 10428->10430 10429->9665 10430->10429 10431 4073d1 21 API calls 10430->10431 10431->10429 10432->9672 10433->9674 10434->9676 10435->9678 10436->9684 10437->9686 10438->9690 10439->9694 10441 40661a 2 API calls 10440->10441 10442 40715c 10441->10442 10442->9702 10446 40716d 10443->10446 10447 40661a 2 API calls 10446->10447 10448 407175 10447->10448 10448->9702 10450 40661a 2 API calls 10449->10450 10451 4071a7 10450->10451 10451->9728 8032 40f3f1 8035 4024e7 8032->8035 8040 40245a 8035->8040 8038 4024f5 8039 4024f6 malloc 8041 40246a 8040->8041 8047 402466 8040->8047 8042 40247a GlobalMemoryStatusEx 8041->8042 8041->8047 8043 402488 8042->8043 8042->8047 8043->8047 8048 401f9d 8043->8048 8047->8038 8047->8039 8049 401fb4 8048->8049 8050 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8049->8050 8051 401fdb 8049->8051 8052 402095 SetLastError 8050->8052 8053 40201d ??2@YAPAXI GetEnvironmentVariableW 8050->8053 8068 407717 8051->8068 8052->8051 8058 4020ac 8052->8058 8054 40204c GetLastError 8053->8054 8067 40207e ??3@YAXPAX 8053->8067 8055 402052 8054->8055 8054->8067 8061 402081 8055->8061 8062 40205c lstrcmpiW 8055->8062 8057 4020cb lstrlenA ??2@YAPAXI 8059 402136 MultiByteToWideChar 8057->8059 8060 4020fc GetLocaleInfoW 8057->8060 8058->8057 8075 401f47 8058->8075 8059->8051 8060->8059 8065 402123 _wtol 8060->8065 8061->8052 8066 40206b ??3@YAXPAX 8062->8066 8062->8067 8064 4020c1 8064->8057 8065->8059 8066->8061 8067->8061 8082 40661a 8068->8082 8071 40773c IsBadReadPtr 8073 40774e 8071->8073 8086 4073d1 8073->8086 8076 401f51 GetUserDefaultUILanguage 8075->8076 8077 401f95 8075->8077 8078 401f72 GetSystemDefaultUILanguage 8076->8078 8079 401f6e 8076->8079 8077->8064 8078->8077 8080 401f7e GetSystemDefaultLCID 8078->8080 8079->8064 8080->8077 8081 401f8e 8080->8081 8081->8077 8083 406643 8082->8083 8084 40666f IsWindow 8082->8084 8083->8084 8085 40664b GetSystemMetrics GetSystemMetrics 8083->8085 8084->8071 8084->8073 8085->8084 8087 4073e0 8086->8087 8088 407444 8086->8088 8087->8088 8098 4024fc 8087->8098 8088->8047 8090 4073f1 8091 4024fc 2 API calls 8090->8091 8092 4073fc 8091->8092 8102 403b7f 8092->8102 8095 403b7f 19 API calls 8096 40740e ??3@YAXPAX ??3@YAXPAX 8095->8096 8096->8088 8099 402513 8098->8099 8111 40112b 8099->8111 8101 40251e 8101->8090 8175 403880 8102->8175 8104 403b59 8116 40393b 8104->8116 8106 403b69 8139 4039f6 8106->8139 8108 403b74 8162 4027c7 8108->8162 8112 401177 8111->8112 8113 401139 ??2@YAPAXI 8111->8113 8112->8101 8113->8112 8115 40115a 8113->8115 8114 40116f ??3@YAXPAX 8114->8112 8115->8114 8115->8115 8198 401411 8116->8198 8120 403954 8205 40254d 8120->8205 8122 403961 8123 4024fc 2 API calls 8122->8123 8124 40396e 8123->8124 8209 403805 8124->8209 8127 401362 2 API calls 8128 403992 8127->8128 8129 40254d 2 API calls 8128->8129 8130 40399f 8129->8130 8131 4024fc 2 API calls 8130->8131 8132 4039ac 8131->8132 8133 403805 3 API calls 8132->8133 8134 4039bc ??3@YAXPAX 8133->8134 8135 4024fc 2 API calls 8134->8135 8136 4039d3 8135->8136 8137 403805 3 API calls 8136->8137 8138 4039e2 ??3@YAXPAX ??3@YAXPAX 8137->8138 8138->8106 8140 401411 2 API calls 8139->8140 8141 403a04 8140->8141 8142 401362 2 API calls 8141->8142 8143 403a0f 8142->8143 8144 40254d 2 API calls 8143->8144 8145 403a1c 8144->8145 8146 4024fc 2 API calls 8145->8146 8147 403a29 8146->8147 8148 403805 3 API calls 8147->8148 8149 403a39 ??3@YAXPAX 8148->8149 8150 401362 2 API calls 8149->8150 8151 403a4d 8150->8151 8152 40254d 2 API calls 8151->8152 8153 403a5a 8152->8153 8154 4024fc 2 API calls 8153->8154 8155 403a67 8154->8155 8156 403805 3 API calls 8155->8156 8157 403a77 ??3@YAXPAX 8156->8157 8158 4024fc 2 API calls 8157->8158 8159 403a8e 8158->8159 8160 403805 3 API calls 8159->8160 8161 403a9d ??3@YAXPAX ??3@YAXPAX 8160->8161 8161->8108 8163 401411 2 API calls 8162->8163 8164 4027d5 8163->8164 8165 4027e5 ExpandEnvironmentStringsW 8164->8165 8166 40112b 2 API calls 8164->8166 8167 402809 8165->8167 8168 4027fe ??3@YAXPAX 8165->8168 8166->8165 8234 402535 8167->8234 8169 402840 8168->8169 8169->8095 8172 402824 8173 401362 2 API calls 8172->8173 8174 402838 ??3@YAXPAX 8173->8174 8174->8169 8176 401411 2 API calls 8175->8176 8177 40388e 8176->8177 8178 401362 2 API calls 8177->8178 8179 403899 8178->8179 8180 40254d 2 API calls 8179->8180 8181 4038a6 8180->8181 8182 4024fc 2 API calls 8181->8182 8183 4038b3 8182->8183 8184 403805 3 API calls 8183->8184 8185 4038c3 ??3@YAXPAX 8184->8185 8186 401362 2 API calls 8185->8186 8187 4038d7 8186->8187 8188 40254d 2 API calls 8187->8188 8189 4038e4 8188->8189 8190 4024fc 2 API calls 8189->8190 8191 4038f1 8190->8191 8192 403805 3 API calls 8191->8192 8193 403901 ??3@YAXPAX 8192->8193 8194 4024fc 2 API calls 8193->8194 8195 403918 8194->8195 8196 403805 3 API calls 8195->8196 8197 403927 ??3@YAXPAX ??3@YAXPAX 8196->8197 8197->8104 8199 40112b 2 API calls 8198->8199 8200 401425 8199->8200 8201 401362 8200->8201 8202 40136e 8201->8202 8204 401380 8201->8204 8203 40112b 2 API calls 8202->8203 8203->8204 8204->8120 8206 40255a 8205->8206 8214 401398 8206->8214 8208 402565 8208->8122 8210 40381b 8209->8210 8211 403817 ??3@YAXPAX 8209->8211 8210->8211 8218 4026b1 8210->8218 8222 402f96 8210->8222 8211->8127 8215 4013dc 8214->8215 8216 4013ac 8214->8216 8215->8208 8217 40112b 2 API calls 8216->8217 8217->8215 8219 4026c7 8218->8219 8220 4026db 8219->8220 8226 402346 memmove 8219->8226 8220->8210 8223 402fa5 8222->8223 8225 402fbe 8223->8225 8227 4026e6 8223->8227 8225->8210 8226->8220 8228 4026f6 8227->8228 8229 401398 2 API calls 8228->8229 8230 402702 8229->8230 8233 402346 memmove 8230->8233 8232 40270f 8232->8225 8233->8232 8235 402541 8234->8235 8236 402547 ExpandEnvironmentStringsW 8234->8236 8237 40112b 2 API calls 8235->8237 8236->8172 8237->8236 11181 40e4f9 11182 40e516 11181->11182 11183 40e506 11181->11183 11186 40de46 11183->11186 11189 401b1f VirtualFree 11186->11189 11188 40de81 ??3@YAXPAX 11188->11182 11189->11188
                                                                                    APIs
                                                                                      • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                      • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                      • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                      • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                      • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                                                      • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                      • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                    • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                                                                    • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                                                      • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                      • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                      • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                      • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                      • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                                                      • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                                                                    • _wtol.MSVCRT ref: 0040509F
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                                                                    • _wtol.MSVCRT ref: 00405217
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                                                      • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                      • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                      • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                                                      • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                      • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                      • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                      • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                      • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                                                      • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                                                      • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                                                      • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                                                      • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                                                                    • wsprintfW.USER32 ref: 00405595
                                                                                    • _wtol.MSVCRT ref: 004057DE
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                                                                    • CoInitialize.OLE32(00000000), ref: 004059E9
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                                                                    • GetKeyState.USER32(00000010), ref: 00405AA1
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                                                                    • memset.MSVCRT ref: 004060AE
                                                                                    • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                                                                    • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                                                      • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                      • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                      • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                      • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                      • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                      • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                      • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                      • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                      • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                      • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                      • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                                                                    • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                                                                    • _wtol.MSVCRT ref: 00405F65
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                                                                    • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                                                                    • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$Px]$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                                                                    • API String ID: 154539431-2048743833
                                                                                    • Opcode ID: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                                                                    • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                                                                    • Opcode Fuzzy Hash: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                                                                    • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 701 4017a2-4017a8 695->701 702 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->702 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 701->704 705 4017aa-4017ad 701->705 702->660 706 4017dc-4017df 704->706 708 4017b6-4017c2 705->708 709 4017af-4017b1 705->709 710 4017e1-4017eb call 403354 706->710 711 4017f8-4017ff call 40301a 706->711 708->706 709->693 710->697 716 4017f1-4017f3 710->716 715 401804-401809 711->715 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 744 4018d1-4018d9 739->744 745 4018db-4018f3 call 40db53 739->745 743 40188a-40189a ??3@YAXPAX@Z 740->743 746 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 743->746 747 40189c-40189e 743->747 744->743 753 4018f5-401904 GetLastError 745->753 754 401906-40190e ??3@YAXPAX@Z 745->754 746->660 747->746 753->743 754->729
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                                                                    • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                                                                    • Opcode Fuzzy Hash: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                                                                    • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                                                                    • SetLastError.KERNEL32(00000010), ref: 0040303D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 1799206407-0
                                                                                    • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                    • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                                                                    • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                    • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                                                                    APIs
                                                                                    • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                                                                    • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: DiskFreeMessageSendSpace
                                                                                    • String ID:
                                                                                    • API String ID: 696007252-0
                                                                                    • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                    • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                                                                    • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                    • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                    • String ID: HpA
                                                                                    • API String ID: 801014965-2938899866
                                                                                    • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                    • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                                                                    • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                    • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                    • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                    • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                    • DispatchMessageW.USER32(?), ref: 00401B89
                                                                                    • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                    • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                    • String ID: Static
                                                                                    • API String ID: 2479445380-2272013587
                                                                                    • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                    • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                                                                    • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                    • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                                                                    • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@memcpymemmove
                                                                                    • String ID:
                                                                                    • API String ID: 3549172513-3916222277
                                                                                    • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                    • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                                                                    • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                    • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 852 4033f8-4033fa 838->852 853 403419-40341b 839->853 854 40340a-403417 call 407776 839->854 840->831 848 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->848 849 40347f-40348a 841->849 844->837 845 4033b6 844->845 845->835 865 4034bc-4034c0 848->865 849->848 850 40348c-403490 849->850 850->848 856 403492-403497 850->856 860 40349c-4034a5 ??3@YAXPAX@Z 852->860 857 40346b-403475 ??3@YAXPAX@Z 853->857 858 40341d-40343c memcpy 853->858 854->852 856->848 862 403499-40349b 856->862 857->865 863 403451-403455 858->863 864 40343e 858->864 860->865 862->860 867 403440-403448 863->867 868 403457-403464 call 401986 863->868 866 403450 864->866 866->863 867->868 869 40344a-40344e 867->869 868->854 872 403466-403469 868->872 869->866 869->868 872->857 872->858
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                    • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                      • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                      • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                    • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 846840743-0
                                                                                    • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                    • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                                                                    • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                    • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                      • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                      • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                      • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                      • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                      • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                      • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                      • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                      • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                      • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                      • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                      • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                      • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                                                      • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                                                                    • wsprintfW.USER32 ref: 004044A7
                                                                                      • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                    • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                    • String ID: 7zSfxFolder%02d$IA
                                                                                    • API String ID: 3387708999-1317665167
                                                                                    • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                    • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                                                                    • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                    • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 924 408f26 923->924 925 408f19-408f24 923->925 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 924->927 925->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 945 409199-4091b0 935->945 946 409019-40901c 935->946 939 409020-409035 call 40e8da call 40874d 936->939 966 408fb0-408fb2 937->966 967 408fb6-408fbb 937->967 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 945->952 953 40934c-409367 call 4087ea 945->953 946->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 968 4090ad-4090b3 955->968 969 40907f 955->969 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 964 409051-409061 call 408726 958->964 959->964 988 409063-409066 964->988 989 409068 964->989 966->967 970 408fc3-408fcf 967->970 971 408fbd-408fbf 967->971 981 409187-409196 call 408e83 968->981 982 4090b9-4090d9 call 40d94b 968->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 969->977 970->922 970->923 971->970 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->968 1016 409261-409264 978->1016 1017 4092c9 978->1017 986 4091f7-409209 979->986 987 4092b9-4092bb 979->987 981->945 993 4090de-4090e6 982->993 1002 4093a4-4093b8 call 408761 983->1002 1003 4093ba-4093d6 983->1003 1014 409293-409295 986->1014 1015 40920f-409211 986->1015 1004 4092bf-4092c4 987->1004 996 40906a 988->996 989->996 1000 409283-409288 993->1000 1001 4090ec-4090f3 993->1001 996->955 1012 409290 1000->1012 1013 40928a-40928c 1000->1013 1008 409121-409124 1001->1008 1009 4090f5-4090f9 1001->1009 1002->1003 1080 4093d7 call 40ce70 1003->1080 1081 4093d7 call 40f160 1003->1081 1004->977 1022 4092b2-4092b7 1008->1022 1023 40912a-409138 call 408726 1008->1023 1009->1008 1018 4090fb-4090fe 1009->1018 1012->1014 1013->1012 1025 409297-409299 1014->1025 1026 40929d-4092a0 1014->1026 1015->978 1024 409213-409215 1015->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->987 1022->1004 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1050 409281 1027->1050 1028->1046 1051 409114-40911f call 40d6cb 1028->1051 1029->1004 1034 4092ac-4092ae 1029->1034 1037 4092d4-4092e0 call 408a55 1030->1037 1038 40931d-409346 call 40e959 * 2 1030->1038 1034->1022 1057 4092e2-4092ec 1037->1057 1058 4092ee-4092fa call 408aa0 1037->1058 1038->953 1038->957 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1050->1030 1051->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1066 409165-409167 1060->1066 1067 40916b-409170 1060->1067 1063->1037 1063->1038 1066->1067 1071 409172-409174 1067->1071 1072 409178-409181 1067->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@
                                                                                    • String ID: IA$IA
                                                                                    • API String ID: 1033339047-1400641299
                                                                                    • Opcode ID: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                                                                    • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                                                                    • Opcode Fuzzy Hash: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                                                                    • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID: $KA$4KA$HKA$\KA
                                                                                    • API String ID: 1294909896-3316857779
                                                                                    • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                    • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                                                                    • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                    • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1121 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1121 1122 40983c-409846 call 409425 1112->1122 1113->1114 1115 409780-409796 call 4094e0 call 40969d call 40e959 1114->1115 1116 4097a3-4097a8 1114->1116 1137 40979b-4097a1 1115->1137 1119 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1116->1119 1120 4097aa-4097b4 1116->1120 1125 4097f3-409809 1119->1125 1120->1119 1120->1125 1133 409881-40989a call 4010e2 call 40eb24 1121->1133 1134 409878-40987f call 40ebf7 1121->1134 1144 40984a-40984c 1122->1144 1130 40980c-409814 1125->1130 1136 409816-409825 call 409403 1130->1136 1130->1137 1154 40989d-4098c0 call 40eb19 1133->1154 1134->1133 1136->1130 1137->1109 1144->1110 1157 4098c2-4098c7 1154->1157 1158 4098f6-4098f9 1154->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1164 409954 1159->1164 1165 40994b-409952 call 409c13 1159->1165 1166 409902-409904 1160->1166 1167 409908-40991e call 409530 call 409425 1160->1167 1161->1162 1180 4098e9-4098eb 1162->1180 1181 4098ef-4098f1 1162->1181 1170 409956-40996d call 4010e2 1164->1170 1165->1170 1166->1167 1167->1159 1182 40997b-4099a0 call 409fb4 1170->1182 1183 40996f-409978 1170->1183 1180->1181 1181->1110 1186 4099a2-4099a7 1182->1186 1187 4099e3-4099e6 1182->1187 1183->1182 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1154 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1226 409aa2-409aa4 1213->1226 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1223 409a73-409a75 1218->1223 1224 409a79-409a91 call 409530 call 409425 1218->1224 1219->1213 1220->1195 1221 409adf-409ae5 1220->1221 1221->1195 1223->1224 1224->1144 1233 409a97-409a9d 1224->1233 1229 409aa6-409aa8 1226->1229 1230 409aac-409ab0 1226->1230 1229->1230 1230->1195 1233->1144
                                                                                    APIs
                                                                                    • _EH_prolog.MSVCRT ref: 004096D0
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                                                      • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$H_prolog
                                                                                    • String ID: HIA
                                                                                    • API String ID: 3431946709-2712174624
                                                                                    • Opcode ID: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                                                                    • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                                                                    • Opcode Fuzzy Hash: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                                                                    • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                                                                    APIs
                                                                                    • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                    • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                    • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                    • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                    • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlenmemcmp$memmove
                                                                                    • String ID:
                                                                                    • API String ID: 3251180759-0
                                                                                    • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                    • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                                                                    • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                    • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                                                                    APIs
                                                                                    • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                                                                    • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                                                      • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                      • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                      • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                      • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                      • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                      • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                      • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                      • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                      • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                      • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                      • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 359084233-0
                                                                                    • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                    • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                                                                    • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                    • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                                                                    • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                                                                    • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                    • String ID:
                                                                                    • API String ID: 635176117-0
                                                                                    • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                    • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                                                                    • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                    • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000020,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@
                                                                                    • String ID: ExecuteFile
                                                                                    • API String ID: 1033339047-323923146
                                                                                    • Opcode ID: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                                                                    • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                                                                    • Opcode Fuzzy Hash: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                                                                    • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                    • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@memmove
                                                                                    • String ID:
                                                                                    • API String ID: 3828600508-0
                                                                                    • Opcode ID: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                                                                    • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                                                                    • Opcode Fuzzy Hash: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                                                                    • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID: @
                                                                                    • API String ID: 1890195054-2766056989
                                                                                    • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                    • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                                                                    • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                    • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                                                                    APIs
                                                                                      • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                                                      • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                      • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                      • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$??2@ExceptionThrowmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 4269121280-0
                                                                                    • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                    • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                                                                    • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                    • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 1329742358-0
                                                                                    • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                    • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                                                                    • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                    • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@
                                                                                    • String ID:
                                                                                    • API String ID: 1936579350-0
                                                                                    • Opcode ID: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                                                                                    • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                                                                    • Opcode Fuzzy Hash: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                                                                                    • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@
                                                                                    • String ID:
                                                                                    • API String ID: 1936579350-0
                                                                                    • Opcode ID: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                                                                    • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                                                                                    • Opcode Fuzzy Hash: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                                                                    • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer
                                                                                    • String ID:
                                                                                    • API String ID: 2976181284-0
                                                                                    • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                    • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                                                                    • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                    • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                                                                    APIs
                                                                                    • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                                                                    • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocExceptionStringThrow
                                                                                    • String ID:
                                                                                    • API String ID: 3773818493-0
                                                                                    • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                    • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                                                                    • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                    • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                                                                    APIs
                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3168844106-0
                                                                                    • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                    • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                                                                    • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                    • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                    • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                                                                    • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                    • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                                                                    APIs
                                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                    • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                                                                    • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                    • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                                                                    APIs
                                                                                      • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateFileHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3498533004-0
                                                                                    • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                    • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                                                                    • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                    • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                                                                    APIs
                                                                                    • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                    • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                                                                    • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                    • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                                                                    APIs
                                                                                    • _beginthreadex.MSVCRT ref: 00406552
                                                                                      • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_beginthreadex
                                                                                    • String ID:
                                                                                    • API String ID: 4034172046-0
                                                                                    • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                    • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                                                                    • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                    • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog
                                                                                    • String ID:
                                                                                    • API String ID: 3519838083-0
                                                                                    • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                    • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                                                                    • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                    • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                                                                    APIs
                                                                                    • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                    • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                                                                    • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                    • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                                                                    APIs
                                                                                    • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileTime
                                                                                    • String ID:
                                                                                    • API String ID: 1425588814-0
                                                                                    • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                    • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                                                                    • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                    • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1033339047-0
                                                                                    • Opcode ID: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                                                                                    • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                                                                                    • Opcode Fuzzy Hash: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                                                                                    • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID:
                                                                                    • API String ID: 1294909896-0
                                                                                    • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                    • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                                                                    • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                    • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1033339047-0
                                                                                    • Opcode ID: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                                                                    • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                                                                    • Opcode Fuzzy Hash: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                                                                    • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                    • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                                                                    • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                    • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                    • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                                                                    • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                    • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                                                                    APIs
                                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                    • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                                                                    • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                    • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID:
                                                                                    • API String ID: 1294909896-0
                                                                                    • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                    • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                                                                    • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    • _wtol.MSVCRT ref: 004034E5
                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,Px],00000000,00417794), ref: 00403588
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                                                                    • _wtol.MSVCRT ref: 0040367F
                                                                                    • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                    • String ID: .lnk$Px]
                                                                                    • API String ID: 408529070-2818861444
                                                                                    • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                    • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                                                                    • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                    • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                    • wsprintfW.USER32 ref: 00401FFD
                                                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                    • GetLastError.KERNEL32 ref: 00402017
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                    • GetLastError.KERNEL32 ref: 0040204C
                                                                                    • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                    • SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                    • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                    • _wtol.MSVCRT ref: 0040212A
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                    • String ID: 7zSfxString%d$XpA$\3A
                                                                                    • API String ID: 2117570002-3108448011
                                                                                    • Opcode ID: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                                                                    • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                                                                    • Opcode Fuzzy Hash: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                                                                    • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                    • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                    • LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                    • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                                                                    • wsprintfW.USER32 ref: 00401C95
                                                                                    • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                    • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                    • API String ID: 2639302590-365843014
                                                                                    • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                    • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                                                                    • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                    • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                                                                    APIs
                                                                                    • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                    • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                    • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                    • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                    • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                    • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 829399097-0
                                                                                    • Opcode ID: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                                                                    • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                                                                    • Opcode Fuzzy Hash: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                                                                    • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                                                                    • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                                                                    • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                                                                    • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                                                                    • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                    • String ID:
                                                                                    • API String ID: 1862581289-0
                                                                                    • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                    • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                                                                    • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                    • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                                                                    • GetWindow.USER32(?,00000005), ref: 00406D8F
                                                                                    • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AddressLibraryLoadProc
                                                                                    • String ID: SetWindowTheme$\EA$uxtheme
                                                                                    • API String ID: 324724604-1613512829
                                                                                    • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                    • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                                                                    • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                    • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                    • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                                                                    • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                    • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                    • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                                                                    • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                    • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                    • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                                                                    • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                    • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                    • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                                                                    • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                    • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                                                                    APIs
                                                                                    • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                                                                    • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                                                                    • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                                                                    • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                    • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                    • API String ID: 3007203151-3467708659
                                                                                    • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                    • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                                                                    • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                    • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                                                                    APIs
                                                                                    • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                      • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                      • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                      • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                      • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                      • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                      • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                      • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                      • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                      • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                      • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                      • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                    • _wtol.MSVCRT ref: 004047DC
                                                                                    • _wtol.MSVCRT ref: 004047F8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                    • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                                                                    • API String ID: 2725485552-3187639848
                                                                                    • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                    • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                                                                    • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                    • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                                                                    APIs
                                                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                                                      • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                      • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                      • Part of subcall function 00401A85: CharUpperW.USER32(?,76E1E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                      • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                                                                    • GetParent.USER32(?), ref: 00402E2E
                                                                                    • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                                                                    • GetMenu.USER32(?), ref: 00402E55
                                                                                    • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                                                                    • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                                                                    • DestroyWindow.USER32(?), ref: 00402EA3
                                                                                    • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                                                                    • GetSysColor.USER32(0000000F), ref: 00402EBC
                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                                                                    • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                    • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                    • API String ID: 1731037045-2281146334
                                                                                    • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                    • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                                                                    • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                    • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                                                                    APIs
                                                                                    • GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                    • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                    • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                    • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                    • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                    • DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                    • DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                                                                    • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3462224810-0
                                                                                    • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                    • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                                                                    • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                    • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                                                                    APIs
                                                                                    • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                                                                    • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                                                                    • GetMenu.USER32(?), ref: 00401E44
                                                                                      • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                      • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                      • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                      • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                      • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                      • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                    • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                                                                    • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                                                                    • CoInitialize.OLE32(00000000), ref: 00401E8C
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                                                      • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                      • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                      • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                      • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                      • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                      • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                      • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                      • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                      • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                      • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                      • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                      • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                      • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                      • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                      • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                      • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                      • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                      • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                      • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                                                                    • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                                                                    • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                    • String ID: IMAGES$STATIC
                                                                                    • API String ID: 4202116410-1168396491
                                                                                    • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                    • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                                                                    • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                    • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                                                                    APIs
                                                                                      • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                      • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                    • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                                                                    • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                                                                    • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                                                                    • SetWindowLongW.USER32(00000000), ref: 004081D8
                                                                                    • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                                                                    • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                                                                    • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                                                                    • SetFocus.USER32(00000000), ref: 0040821D
                                                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                                                                    • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00408294
                                                                                    • IsWindow.USER32(00000000), ref: 00408297
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                                                                    • EnableWindow.USER32(00000000), ref: 004082AA
                                                                                    • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                                                                    • ShowWindow.USER32(00000000), ref: 004082C1
                                                                                      • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                                                      • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                      • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                      • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                      • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                                                      • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                      • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                      • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                      • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                      • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                      • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                      • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                      • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                      • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                      • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                      • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 855516470-0
                                                                                    • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                    • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                                                                    • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                    • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                                                                    • strncmp.MSVCRT ref: 004031F1
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                                                                    • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                                                                    • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$lstrcmpstrncmp
                                                                                    • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                                                                    • API String ID: 2881732429-172299233
                                                                                    • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                    • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                                                                    • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                    • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                                                                    • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                                                                    • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                                                                    • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                                                                    • GetParent.USER32(?), ref: 00406B43
                                                                                    • GetClientRect.USER32(00000000,?), ref: 00406B55
                                                                                    • ClientToScreen.USER32(?,?), ref: 00406B68
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                                                                    • GetClientRect.USER32(?,?), ref: 00406C55
                                                                                    • ClientToScreen.USER32(?,?), ref: 00406B71
                                                                                      • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                                                      • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                                                      • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                    • String ID:
                                                                                    • API String ID: 747815384-0
                                                                                    • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                    • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                                                                    • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                    • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                    • LoadIconW.USER32(00000000), ref: 00407D33
                                                                                    • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                    • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                    • LoadImageW.USER32(00000000), ref: 00407D54
                                                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                    • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                    • GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                    • GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                    • GetWindow.USER32(?,00000005), ref: 00407EAA
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                                                                    • LoadIconW.USER32(00000000), ref: 00407F0D
                                                                                    • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                                                                    • SendMessageW.USER32(00000000), ref: 00407F2F
                                                                                      • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                      • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                      • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                      • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                    • String ID:
                                                                                    • API String ID: 1889686859-0
                                                                                    • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                    • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                                                                    • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                    • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                                                                    APIs
                                                                                    • GetParent.USER32(?), ref: 00406F45
                                                                                    • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                                                                    • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                                                                    • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                                                                    • GetWindowDC.USER32(?), ref: 00406FAA
                                                                                    • GetWindowRect.USER32(?,?), ref: 00406FB7
                                                                                    • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                    • String ID:
                                                                                    • API String ID: 2586545124-0
                                                                                    • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                    • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                                                                    • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                    • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                                                                    • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                                                                    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                                                                    • GetDlgItem.USER32(?,?), ref: 004067CC
                                                                                    • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                                                                    • GetDlgItem.USER32(?,?), ref: 004067DD
                                                                                    • SetFocus.USER32(00000000,?,000004B4,76E20E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMessageSend$Focus
                                                                                    • String ID:
                                                                                    • API String ID: 3946207451-0
                                                                                    • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                    • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                                                                    • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                    • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID: IA$IA$IA$IA$IA$IA
                                                                                    • API String ID: 613200358-3743982587
                                                                                    • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                    • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                                                                    • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                    • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                                                                    • API String ID: 613200358-994561823
                                                                                    • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                    • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                                                                    • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                    • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                                                                    • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                                                                    • GetDC.USER32(00000000), ref: 00406DFB
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                                                                    • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                                                                    • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 2693764856-0
                                                                                    • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                    • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                                                                    • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                    • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                                                                    APIs
                                                                                    • GetDC.USER32(?), ref: 0040696E
                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                                                                    • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                                                                    • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                                                                    • SelectObject.GDI32(?,?), ref: 004069B8
                                                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                                                                    • SelectObject.GDI32(?,?), ref: 004069F9
                                                                                    • ReleaseDC.USER32(?,?), ref: 00406A08
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                    • String ID:
                                                                                    • API String ID: 2466489532-0
                                                                                    • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                    • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                                                                    • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                    • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                                                                    APIs
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                    • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                    • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                    • wsprintfW.USER32 ref: 00407BBB
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                    • String ID: %d%%
                                                                                    • API String ID: 3753976982-1518462796
                                                                                    • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                    • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                                                                    • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                    • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                                                      • Part of subcall function 00401A85: CharUpperW.USER32(?,76E1E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                      • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$CharUpper$lstrlen
                                                                                    • String ID: hAA
                                                                                    • API String ID: 2587799592-1362906312
                                                                                    • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                    • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                                                                    • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                    • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                                                      • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                      • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                      • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                      • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                    • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                    • API String ID: 4038993085-2279431206
                                                                                    • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                    • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                                                                    • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                    • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                                                                    APIs
                                                                                    • EndDialog.USER32(?,00000000), ref: 00407579
                                                                                    • KillTimer.USER32(?,00000001), ref: 0040758A
                                                                                    • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                                                                    • SuspendThread.KERNEL32(00000290), ref: 004075CD
                                                                                    • ResumeThread.KERNEL32(00000290), ref: 004075EA
                                                                                    • EndDialog.USER32(?,00000000), ref: 0040760C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                    • String ID:
                                                                                    • API String ID: 4151135813-0
                                                                                    • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                    • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                                                                    • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                    • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                      • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                                                                    • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                    • wsprintfA.USER32 ref: 00404EBC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$wsprintf
                                                                                    • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                    • API String ID: 2704270482-1550708412
                                                                                    • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                    • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                                                                    • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                    • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID: %%T/$%%T\
                                                                                    • API String ID: 613200358-2679640699
                                                                                    • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                    • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                                                                    • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                    • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID: %%S/$%%S\
                                                                                    • API String ID: 613200358-358529586
                                                                                    • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                    • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                                                                    • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                    • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID: %%M/$%%M\
                                                                                    • API String ID: 613200358-4143866494
                                                                                    • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                    • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                                                                    • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                    • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                                                                    APIs
                                                                                    • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionThrow
                                                                                    • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                                                                    • API String ID: 432778473-803145960
                                                                                    • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                    • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                                                                    • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                    • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                                                                    APIs
                                                                                      • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                                                      • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                      • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                      • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$??3@$memmove
                                                                                    • String ID: IA$IA$IA
                                                                                    • API String ID: 4294387087-924693538
                                                                                    • Opcode ID: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                                                                    • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                                                                    • Opcode Fuzzy Hash: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                                                                    • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                                                                    APIs
                                                                                    • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                                                                    • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                    • String ID: IA
                                                                                    • API String ID: 3462485524-3293647318
                                                                                    • Opcode ID: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                                                                    • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                                                                    • Opcode Fuzzy Hash: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                                                                    • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: wsprintf$ExitProcesslstrcat
                                                                                    • String ID: 0x%p
                                                                                    • API String ID: 2530384128-1745605757
                                                                                    • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                    • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                                                                    • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                    • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                                                                    APIs
                                                                                      • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                                                      • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$??3@
                                                                                    • String ID: 100%%
                                                                                    • API String ID: 2562992111-568723177
                                                                                    • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                    • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                                                                    • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                    • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                                                                    APIs
                                                                                    • wsprintfW.USER32 ref: 00407A12
                                                                                      • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                      • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                    • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                                                      • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                      • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow$ItemLength$??3@wsprintf
                                                                                    • String ID: (%u%s)
                                                                                    • API String ID: 3595513934-2496177969
                                                                                    • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                    • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                                                                    • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                    • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                                                                    APIs
                                                                                    • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,Px],00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                    • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentVariable
                                                                                    • String ID: ?O@$Px]
                                                                                    • API String ID: 1431749950-3563725403
                                                                                    • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                    • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                                                                    • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                    • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: GetNativeSystemInfo$kernel32
                                                                                    • API String ID: 2574300362-3846845290
                                                                                    • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                    • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                                                                    • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                    • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                    • API String ID: 2574300362-3900151262
                                                                                    • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                    • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                                                                    • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                    • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                    • API String ID: 2574300362-736604160
                                                                                    • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                    • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                                                                    • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                    • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                      • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1731127917-0
                                                                                    • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                    • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                                                                    • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                    • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                                                                    • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                                                                    • wsprintfW.USER32 ref: 00403FFB
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: PathTemp$AttributesFilewsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 1746483863-0
                                                                                    • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                    • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                                                                    • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                    • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                                                                    APIs
                                                                                    • CharUpperW.USER32(?,76E1E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                    • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                    • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                                                                    • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharUpper
                                                                                    • String ID:
                                                                                    • API String ID: 9403516-0
                                                                                    • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                    • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                                                                    • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                    • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                                                                    APIs
                                                                                      • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                      • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                      • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                                                                    • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                                                                    • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                                                      • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                      • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                      • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                      • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                      • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                      • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                      • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                      • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                      • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                      • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                      • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                      • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                                                                    • String ID:
                                                                                    • API String ID: 2538916108-0
                                                                                    • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                    • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                                                                    • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                    • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                                                                    • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00406849
                                                                                    • DeleteObject.GDI32(00000000), ref: 00406878
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                    • String ID:
                                                                                    • API String ID: 1900162674-0
                                                                                    • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                    • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                                                                    • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                    • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040749F
                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                                                                    • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                                                      • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                      • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                    • String ID:
                                                                                    • API String ID: 1557639607-0
                                                                                    • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                    • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                                                                    • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                    • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                                                                    APIs
                                                                                    • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                      • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                      • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                    • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 612612615-0
                                                                                    • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                    • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                                                                    • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                    • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                                                                    APIs
                                                                                      • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                      • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                                                                    • SetWindowTextW.USER32(?,?), ref: 00403B12
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@TextWindow$Length
                                                                                    • String ID:
                                                                                    • API String ID: 2308334395-0
                                                                                    • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                    • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                                                                    • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                    • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                                                                    APIs
                                                                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                                                                    • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                                                                    • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                    • String ID:
                                                                                    • API String ID: 2001801573-0
                                                                                    • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                    • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                                                                    • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                    • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                                                                    APIs
                                                                                    • GetParent.USER32(?), ref: 00401BA8
                                                                                    • GetWindowRect.USER32(?,?), ref: 00401BC1
                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientScreen$ParentRectWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2099118873-0
                                                                                    • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                    • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                                                                    • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                    • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                                                                    APIs
                                                                                      • Part of subcall function 00403880: ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                      • Part of subcall function 00403880: ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                      • Part of subcall function 00403880: ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                      • Part of subcall function 00403880: ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                      • Part of subcall function 0040393B: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                      • Part of subcall function 0040393B: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                      • Part of subcall function 0040393B: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                      • Part of subcall function 0040393B: ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                      • Part of subcall function 004039F6: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                      • Part of subcall function 004039F6: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                      • Part of subcall function 004039F6: ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                      • Part of subcall function 004039F6: ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00404F9E
                                                                                      • Part of subcall function 00402F10: GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,Px],00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                      • Part of subcall function 00402F10: GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                      • Part of subcall function 004027C7: ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                      • Part of subcall function 004027C7: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,Px],?,00417794,?,00417788,?,?,?,?,?,?), ref: 00404F82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$Environment$Variable$ExpandStrings
                                                                                    • String ID: Px]
                                                                                    • API String ID: 2352103411-1640048917
                                                                                    • Opcode ID: 23aa743563bdf204dfaa2000382405d6fd06a32ce5dc3ae18421ac109a8763f0
                                                                                    • Instruction ID: 5029ffa206f344f8a73b48d155bf74a85afcc1550fc664b48d157c037572b74a
                                                                                    • Opcode Fuzzy Hash: 23aa743563bdf204dfaa2000382405d6fd06a32ce5dc3ae18421ac109a8763f0
                                                                                    • Instruction Fuzzy Hash: 502112B1D0410E7ACF00EBE5DC86CDF7BBCEA44709B40457BBA10B3092D678A6459BA8
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.2708242191.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.2708226028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708263118.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708279136.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.2708305725.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vV5EOx0ipU.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wtol
                                                                                    • String ID: GUIFlags$[G@
                                                                                    • API String ID: 2131799477-2126219683
                                                                                    • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                    • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                                                                    • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                    • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D

                                                                                    Execution Graph

                                                                                    Execution Coverage:1%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:1.8%
                                                                                    Total number of Nodes:1542
                                                                                    Total number of Limit Nodes:15
                                                                                    execution_graph 13233 6cc27b80 13234 6cc27bb9 13233->13234 13235 6cc27bac 13233->13235 13237 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13234->13237 13236 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13235->13236 13236->13234 13243 6cc27bc9 __except_handler4 __IsNonwritableInCurrentImage 13237->13243 13238 6cc27c4c 13239 6cc27c22 __except_handler4 13239->13238 13240 6cc27c3c 13239->13240 13241 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13239->13241 13242 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13240->13242 13241->13240 13242->13238 13243->13238 13243->13239 13249 6cc3625e RtlUnwind 13243->13249 13245 6cc27c9b __except_handler4 13246 6cc27ccf 13245->13246 13247 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13245->13247 13248 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13246->13248 13247->13246 13248->13239 13250 6cc36273 13249->13250 13250->13245 13278 6c965d74 13279 6c965d8d 13278->13279 13280 6c965d88 13278->13280 13282 6c965dcf 13279->13282 13289 6c96466a 13279->13289 13284 6c964e4e 13280->13284 13285 6c9445a2 23 API calls 13284->13285 13286 6c964e69 13285->13286 13287 6c964e81 13286->13287 13288 6c944301 6 API calls 13286->13288 13287->13279 13288->13287 13290 6c9442c6 23 API calls 13289->13290 13291 6c964676 13290->13291 13291->13282 11446 6c771a74 CreateThread 11447 6c771a89 11446->11447 11448 6c771a91 Sleep 11447->11448 11449 6c771a9e 11447->11449 11448->11447 11448->11449 11420 6c92a7f6 11421 6c92a822 11420->11421 11422 6c92a806 11420->11422 11424 6cc1b9e0 _realloc __VEC_memcpy 11421->11424 11428 6c7721cb GetModuleHandleA 11422->11428 11427 6c92a81d 11424->11427 11429 6c7721ff 11428->11429 11430 6c77222e LocalAlloc 11429->11430 11431 6c77225b 11430->11431 11432 6c7722fd CreateFileW 11431->11432 11433 6c772340 11432->11433 11434 6c772386 ReadFile 11433->11434 11439 6c772358 11433->11439 11435 6c7723e7 11434->11435 11436 6c772448 LoadLibraryA VirtualProtect 11435->11436 11444 6c771f4b 11436->11444 11440 6cc1b9e0 11439->11440 11441 6cc1b9f8 11440->11441 11442 6cc1ba1f __VEC_memcpy 11441->11442 11443 6cc1ba27 11441->11443 11442->11443 11443->11427 11445 6c771f57 VirtualProtect 11444->11445 11445->11439 11450 6c771b73 11451 6c771b8e 11450->11451 11452 6c771b7c 11450->11452 11454 6c7718e8 QStringCreate QStringSet QStringCreate QStringSet 11452->11454 11455 6c771923 11454->11455 11455->11451 12755 6c9271b6 12756 6c9271d9 12755->12756 12758 6c9271df 12755->12758 12757 6c773614 __VEC_memcpy 12756->12757 12757->12758 11456 6c93d495 11457 6c93d4a9 _strlen 11456->11457 11459 6c93d4a1 11456->11459 11458 6cc1b9e0 _realloc __VEC_memcpy 11457->11458 11457->11459 11458->11459 13292 6c93dff5 13293 6c93e008 _strlen 13292->13293 13294 6c93e001 13292->13294 13293->13294 13296 6c93e043 13293->13296 13298 6c93d626 13293->13298 13297 6cc1b9e0 _realloc __VEC_memcpy 13296->13297 13297->13294 13299 6c93d633 13298->13299 13300 6cc1b9e0 _realloc __VEC_memcpy 13299->13300 13301 6c93d63d 13299->13301 13300->13301 13301->13296 13302 6c771390 13303 6c926006 __VEC_memcpy 13302->13303 13304 6c771399 13303->13304 13305 6c9238f8 13307 6c92390a 13305->13307 13306 6c92396d 13307->13306 13309 6c921e40 13307->13309 13310 6c921e5b 13309->13310 13311 6c921ee8 13309->13311 13313 6c921e93 13310->13313 13314 6c921e9d 13310->13314 13321 6c921e98 13310->13321 13311->13306 13312 6c92a7f6 8 API calls 13317 6c921f05 13312->13317 13322 6c7ce3f7 13313->13322 13325 6c7d7592 13314->13325 13317->13311 13319 6c773982 __VEC_memcpy 13317->13319 13318 6c921ea2 13320 6c773982 __VEC_memcpy 13318->13320 13318->13321 13319->13311 13320->13321 13321->13311 13321->13312 13329 6c8a0980 13322->13329 13326 6c7d759e 13325->13326 13328 6c7d75b1 13325->13328 13327 6c8a0980 __VEC_memcpy 13326->13327 13326->13328 13327->13328 13328->13318 13330 6c8a0989 13329->13330 13331 6c7ce3ff 13329->13331 13332 6c984a78 __VEC_memcpy 13330->13332 13331->13321 13332->13331 13251 6c95325e 13252 6c953267 13251->13252 13254 6c953285 13251->13254 13253 6c950434 CreateEventW 13252->13253 13252->13254 13253->13254 13333 6c77139c QStringGet 13334 6c7713ab 13333->13334 13255 6cc20f0e 13258 6cc29c2d LeaveCriticalSection 13255->13258 13257 6cc20f15 13258->13257 13259 6c771ab9 13260 6c771ad2 13259->13260 13261 6c771ac2 13259->13261 13262 6c7718e8 4 API calls 13261->13262 13262->13260 11460 6cc361cc 11461 6cc361de 11460->11461 11463 6cc361ec @_EH4_CallFilterFunc@8 11460->11463 11464 6cc1b4e4 11461->11464 11465 6cc1b4ec 11464->11465 11466 6cc1b4ee IsDebuggerPresent 11464->11466 11465->11463 11472 6cc36134 11466->11472 11469 6cc2693e SetUnhandledExceptionFilter UnhandledExceptionFilter 11470 6cc26963 GetCurrentProcess TerminateProcess 11469->11470 11471 6cc2695b __invoke_watson 11469->11471 11470->11463 11471->11470 11472->11469 11473 6c922e04 11474 6c922e21 11473->11474 11478 6c922e27 11473->11478 11475 6c922e50 11474->11475 11474->11478 11483 6c952dc4 11474->11483 11475->11478 11486 6c9211e6 11475->11486 11479 6c922e87 11492 6c91ffcf 11479->11492 11481 6c922eb3 11482 6c91ffcf SetEvent 11481->11482 11482->11478 11498 6c952c09 11483->11498 11487 6c9211fd 11486->11487 11507 6c773982 11487->11507 11489 6c921207 11490 6c92123c 11489->11490 11491 6c9211e6 __VEC_memcpy 11489->11491 11490->11479 11491->11489 11493 6c91ffef 11492->11493 11494 6c91ffd8 11492->11494 11493->11481 11495 6c91ffe3 11494->11495 11531 6c78d291 11494->11531 11495->11493 11497 6c78d291 SetEvent 11495->11497 11497->11493 11501 6c950434 11498->11501 11502 6c95043e 11501->11502 11503 6c95044e 11502->11503 11505 6c98b392 CreateEventW 11502->11505 11503->11475 11506 6c98b3d3 11505->11506 11506->11503 11508 6c77398a 11507->11508 11509 6c7739a8 11508->11509 11512 6c935ac1 11508->11512 11509->11489 11515 6c941b77 11512->11515 11514 6c7739a7 11514->11489 11516 6c941b81 11515->11516 11518 6c941ba3 11516->11518 11519 6c8bf9b2 11516->11519 11518->11514 11520 6c8bf9cc 11519->11520 11521 6c8bf9d6 11519->11521 11523 6c984a78 11520->11523 11521->11518 11524 6c984a91 11523->11524 11527 6c912f4c 11524->11527 11526 6c984aad 11526->11521 11528 6c912f71 11527->11528 11529 6c912f56 11527->11529 11528->11526 11529->11528 11530 6cc1b9e0 _realloc __VEC_memcpy 11529->11530 11530->11528 11533 6c78d299 11531->11533 11532 6c78d2b5 11532->11495 11533->11532 11534 6c98b389 SetEvent 11533->11534 11534->11495 13263 6c952bc3 13264 6c952bdb 13263->13264 13265 6c952bcc 13263->13265 13266 6c97769b 13265->13266 13267 6c950434 CreateEventW 13265->13267 13268 6c977675 13265->13268 13267->13268 13269 6c977689 TlsAlloc 13268->13269 13269->13266 13335 6cc26b34 TlsGetValue 13336 6cc26b64 13335->13336 13337 6cc26b49 13335->13337 13338 6cc26a99 __decode_pointer 6 API calls 13337->13338 13339 6cc26b54 TlsSetValue 13338->13339 13339->13336 13270 6c93da4a 13271 6c93da57 13270->13271 13272 6c93da66 13270->13272 13274 6c93d504 13272->13274 13275 6c93d50e 13274->13275 13276 6c93d516 13274->13276 13275->13271 13276->13275 13277 6cc1b9e0 _realloc __VEC_memcpy 13276->13277 13277->13275 13340 6c9587ef 13341 6c9587f8 13340->13341 13342 6c958845 13340->13342 13341->13342 13344 6cab1108 13341->13344 13345 6cab1122 13344->13345 13346 6cab1116 13344->13346 13345->13342 13347 6c944301 6 API calls 13346->13347 13347->13345 11539 6c936d0f 11540 6c936d1b 11539->11540 11547 6c935f1d 11540->11547 11542 6c936d27 11556 6c92c402 11542->11556 11544 6c936d5d 11562 6c937495 11544->11562 11546 6c936d8c 11548 6c935f4a 11547->11548 11549 6c935f2c 11547->11549 11555 6c935f5b 11548->11555 11567 6c950cdd GetModuleFileNameW 11548->11567 11549->11542 11551 6c935f76 11574 6c938f25 11551->11574 11553 6c935f80 11578 6c93820a 11553->11578 11555->11542 11557 6c92c411 11556->11557 11558 6c92c430 11556->11558 12424 6c97f9a8 11557->12424 11558->11544 11560 6c92c422 11561 6c9800d6 __VEC_memcpy 11560->11561 11561->11558 11563 6c938f25 136 API calls 11562->11563 11564 6c9374a5 11563->11564 12750 6c938a3c 11564->12750 11566 6c9374ac 11566->11546 11568 6c950d05 11567->11568 11570 6c950d1b 11567->11570 11568->11551 11570->11568 11571 6c950d6f 11570->11571 11572 6c950d62 GetModuleFileNameW 11570->11572 11582 6cc1e055 11570->11582 11608 6cc1e3bb 11571->11608 11572->11570 11572->11571 11575 6c938f32 11574->11575 11577 6c938f42 11575->11577 11670 6c9384da 11575->11670 11577->11553 11579 6c93822b 11578->11579 11581 6c938216 11578->11581 11580 6c9800d6 __VEC_memcpy 11579->11580 11580->11581 11581->11555 11583 6cc1e061 _getenv 11582->11583 11584 6cc1e076 11583->11584 11585 6cc1e068 11583->11585 11587 6cc1e089 11584->11587 11588 6cc1e07d 11584->11588 11618 6cc1e2bf 11585->11618 11593 6cc1e1fb 11587->11593 11598 6cc1e096 ___sbh_resize_block ___sbh_find_block 11587->11598 11589 6cc1e3bb ___free_lconv_num 6 API calls 11588->11589 11603 6cc1e070 __dosmaperr _getenv 11589->11603 11590 6cc1e22e 11592 6cc26986 _realloc 6 API calls 11590->11592 11591 6cc1e200 HeapReAlloc 11591->11593 11591->11603 11592->11603 11593->11590 11593->11591 11594 6cc1e1e1 11593->11594 11595 6cc26986 _realloc 6 API calls 11593->11595 11605 6cc1e1c4 11593->11605 11596 6cc1e25b GetLastError 11594->11596 11594->11603 11595->11593 11596->11603 11598->11590 11598->11594 11599 6cc1e121 HeapAlloc 11598->11599 11601 6cc1e176 HeapReAlloc 11598->11601 11598->11603 11598->11605 11606 6cc1b9e0 __VEC_memcpy _realloc 11598->11606 11607 6cc2a2bf VirtualFree VirtualFree HeapFree ___sbh_free_block 11598->11607 11622 6cc2aa6e 11598->11622 11628 6cc1e199 11598->11628 11631 6cc26986 11598->11631 11599->11598 11600 6cc1e1ce GetLastError 11600->11603 11601->11598 11603->11570 11605->11600 11605->11603 11606->11598 11607->11598 11610 6cc1e3c7 _getenv ___sbh_find_block 11608->11610 11609 6cc1e440 __dosmaperr _getenv 11609->11568 11610->11609 11611 6cc1e406 11610->11611 11615 6cc1e3f8 11610->11615 11660 6cc2a2bf 11610->11660 11611->11609 11612 6cc1e41b HeapFree 11611->11612 11612->11609 11613 6cc1e42d 11612->11613 11614 6cc1e432 GetLastError 11613->11614 11614->11609 11666 6cc1e411 11615->11666 11619 6cc1e372 11618->11619 11620 6cc26986 _realloc 6 API calls 11619->11620 11621 6cc1e378 11620->11621 11625 6cc2aa9c 11622->11625 11623 6cc2ab35 11627 6cc2ab3e 11623->11627 11641 6cc2a685 11623->11641 11625->11623 11625->11627 11634 6cc2a5d5 11625->11634 11627->11598 11645 6cc29c2d LeaveCriticalSection 11628->11645 11630 6cc1e1a0 11630->11598 11646 6cc26a99 TlsGetValue 11631->11646 11635 6cc2a5e8 HeapReAlloc 11634->11635 11636 6cc2a61c HeapAlloc 11634->11636 11637 6cc2a606 11635->11637 11638 6cc2a60a 11635->11638 11636->11637 11639 6cc2a63f VirtualAlloc 11636->11639 11637->11623 11638->11636 11639->11637 11640 6cc2a659 HeapFree 11639->11640 11640->11637 11642 6cc2a69c VirtualAlloc 11641->11642 11644 6cc2a6e3 11642->11644 11644->11627 11645->11630 11647 6cc26ad2 GetModuleHandleW 11646->11647 11648 6cc26ab1 11646->11648 11650 6cc26ae2 11647->11650 11651 6cc26aed GetProcAddress 11647->11651 11648->11647 11649 6cc26abb TlsGetValue 11648->11649 11654 6cc26ac6 11649->11654 11656 6cc20f17 11650->11656 11653 6cc26996 11651->11653 11653->11598 11654->11647 11654->11653 11657 6cc20f22 Sleep GetModuleHandleW 11656->11657 11658 6cc20f40 11657->11658 11659 6cc20f44 11657->11659 11658->11657 11658->11659 11659->11651 11659->11653 11662 6cc2a2fe 11660->11662 11665 6cc2a5a0 ___sbh_free_block 11660->11665 11661 6cc2a4ea VirtualFree 11663 6cc2a54e 11661->11663 11662->11661 11662->11665 11664 6cc2a55d VirtualFree HeapFree 11663->11664 11663->11665 11664->11665 11665->11615 11669 6cc29c2d LeaveCriticalSection 11666->11669 11668 6cc1e418 11668->11611 11669->11668 11671 6c9384f6 11670->11671 11674 6c9808f9 11671->11674 11673 6c938524 11673->11577 11673->11673 11675 6c98090b 11674->11675 11678 6c9806ac 11675->11678 11677 6c980922 11677->11673 11697 6c9800d6 11678->11697 11682 6c98070b 11686 6c9806d6 11682->11686 11710 6c97f6ba 11682->11710 11685 6c980767 11685->11682 11687 6c98076c 11685->11687 11686->11677 11756 6c925b1b 11687->11756 11689 6c980745 11689->11686 11740 6c92bc64 11689->11740 11695 6c9806ac 136 API calls 11696 6c980783 11695->11696 11696->11686 11696->11695 11769 6c925b87 11696->11769 11773 6c8253b4 11696->11773 11779 6c97ff32 11697->11779 11699 6c9800de 11700 6c97cec1 11699->11700 11701 6c97ced0 11700->11701 11702 6c97cf26 11700->11702 11798 6c97cd00 11701->11798 11702->11682 11702->11685 11702->11686 11702->11689 11704 6c97ced7 11804 6c92c2bd 11704->11804 11708 6c97cee7 11812 6c92c2a3 11708->11812 11711 6c97f6e1 11710->11711 11712 6c9800d6 __VEC_memcpy 11711->11712 11713 6c97f701 11712->11713 11714 6c97f732 11713->11714 11989 6c97d33f CoCreateInstance 11713->11989 11998 6c98063d 11714->11998 11718 6c97f85e 11724 6c97f878 11718->11724 12029 6c97eb70 11718->12029 11719 6c97f7cb SetErrorMode 11720 6c97f7dd 11719->11720 12001 6c980654 11720->12001 11726 6c97f78e 11724->11726 11727 6c980654 5 API calls 11724->11727 11726->11686 11729 6c97f8b0 11727->11729 12058 6c97d46d 11729->12058 11730 6c97f811 11732 6c97f81e 11730->11732 11733 6c97f83c 11730->11733 12008 6c97ffd2 11732->12008 12011 6c97ddc6 GetLastError 11733->12011 11736 6c97f846 11737 6c97f858 SetErrorMode 11736->11737 12019 6c97f59a 11736->12019 11737->11718 11739 6c97f826 11739->11737 11741 6c92bc73 11740->11741 11743 6c92bc7f 11741->11743 12267 6c92bbda 11741->12267 12271 6c92ac7e 11743->12271 11745 6c92bca1 12274 6c92b320 11745->12274 11750 6c92b334 8 API calls 11751 6c92bcbe 11750->11751 12280 6c92b346 11751->12280 11755 6c92bcd0 11755->11686 11757 6c925b26 11756->11757 11758 6c925b37 11756->11758 11757->11758 11759 6c92454b __VEC_memcpy 11757->11759 11760 6c92dbad 11758->11760 11759->11758 12387 6c9832ca 11760->12387 11762 6c92dbb6 11763 6c92c2bd 136 API calls 11762->11763 11764 6c92dbc4 11763->11764 11765 6c9832ca 8 API calls 11764->11765 11766 6c92dbcf 11765->11766 11767 6c92c2a3 26 API calls 11766->11767 11768 6c92dbde 11767->11768 11768->11696 11770 6c925b97 11769->11770 11771 6c925bc7 11769->11771 11770->11771 11772 6c92454b __VEC_memcpy 11770->11772 11771->11696 11772->11771 11774 6c8253dd 11773->11774 11775 6c773614 __VEC_memcpy 11774->11775 11776 6c8253e4 11775->11776 12413 6c8251bd 11776->12413 11780 6c97ff45 11779->11780 11784 6c97ffc7 11779->11784 11782 6c97ff9c 11780->11782 11780->11784 11785 6c926de1 11780->11785 11783 6c926de1 __VEC_memcpy 11782->11783 11782->11784 11783->11784 11784->11699 11787 6c926ded 11785->11787 11786 6c926e08 ___sbh_free_block 11786->11782 11787->11786 11789 6c773614 11787->11789 11790 6c77361d 11789->11790 11791 6c77362c 11790->11791 11794 6c925633 11790->11794 11791->11786 11793 6c92573d 11793->11786 11795 6c925640 11794->11795 11796 6c92564a 11795->11796 11797 6cc1b9e0 _realloc __VEC_memcpy 11795->11797 11796->11793 11797->11796 11799 6c97cd09 11798->11799 11802 6c97cd4d 11798->11802 11801 6c97cd27 11799->11801 11799->11802 11828 6c97fb0e 11799->11828 11801->11802 11832 6c97fbdf 11801->11832 11802->11704 11805 6c92c2d3 11804->11805 11806 6c92c2c6 11804->11806 11808 6c97ce3f 11805->11808 11806->11805 11864 6c97fbf6 11806->11864 11809 6c97ce48 11808->11809 11810 6c97ce91 11808->11810 11809->11810 11944 6c97cd7d 11809->11944 11810->11708 11813 6c92c2bc 11812->11813 11814 6c92c2a9 11812->11814 11813->11702 11814->11813 11816 6c97760e GetCurrentThreadId 11814->11816 11817 6c97fd08 11814->11817 11815 6c97fd3b 11815->11702 11818 6c97fcc7 11816->11818 11817->11815 11819 6c97fd33 11817->11819 11820 6c97fd3d 11817->11820 11961 6c921902 11818->11961 11973 6c9988a9 11819->11973 11820->11815 11977 6c998901 11820->11977 11823 6c97fcdc 11965 6c97fbbf 11823->11965 11829 6c97fb18 11828->11829 11830 6c97fb28 11829->11830 11836 6c97fa9f 11829->11836 11830->11801 11833 6c97fbe6 11832->11833 11835 6c97fbed 11832->11835 11847 6c97fb34 11833->11847 11835->11802 11837 6c950434 CreateEventW 11836->11837 11838 6c97faab 11837->11838 11843 6c99895d 11838->11843 11841 6c99895d CreateEventW 11842 6c97fabb 11841->11842 11842->11830 11844 6c998967 11843->11844 11845 6c998865 CreateEventW 11844->11845 11846 6c97fab3 11844->11846 11845->11846 11846->11841 11854 6c78e7c8 11847->11854 11851 6c97fb47 11852 6c99897d CloseHandle 11851->11852 11853 6c97fb4f 11852->11853 11855 6c78e7e2 11854->11855 11856 6c78e7d6 11854->11856 11858 6c99897d 11855->11858 11857 6c944301 6 API calls 11856->11857 11857->11855 11859 6c99898f 11858->11859 11862 6c9989a4 11858->11862 11861 6c99883b CloseHandle 11859->11861 11860 6c99883b CloseHandle 11863 6c9989b1 11860->11863 11861->11862 11862->11860 11863->11851 11865 6c97fc0a 11864->11865 11874 6c97fc3e 11865->11874 11876 6c97760e 11865->11876 11867 6c97fc6d 11875 6c97fc45 11867->11875 11890 6c7e26b4 11867->11890 11874->11867 11874->11875 11878 6c998adc 11874->11878 11875->11805 11877 6cc1b208 GetCurrentThreadId 11876->11877 11879 6c998aee 11878->11879 11889 6c998aea 11878->11889 11879->11889 11896 6c9989c8 11879->11896 11883 6c998b14 11914 6c9987d8 WaitForSingleObject 11883->11914 11889->11874 11891 6c7e26c8 11890->11891 11893 6c7e26cd 11890->11893 11936 6c8bcd4c 11891->11936 11895 6c7e270f 11893->11895 11941 6c97fa5f 11893->11941 11895->11875 11897 6c9506dc 134 API calls 11896->11897 11898 6c9989d5 11897->11898 11899 6c9989fd 11898->11899 11902 6c9989e2 11898->11902 11900 6c95b499 __VEC_memcpy 11899->11900 11901 6c9989f5 GetCurrentThread GetThreadPriority 11900->11901 11905 6c998a2d 11901->11905 11902->11901 11904 6c9987bd CreateEventW 11902->11904 11904->11901 11906 6c857be9 __VEC_memcpy 11905->11906 11907 6c998a5c 11906->11907 11908 6c9504a2 SetEvent 11907->11908 11909 6c998a63 11908->11909 11910 6c9504a2 11909->11910 11911 6c9504ae 11910->11911 11912 6c9504cc 11911->11912 11913 6c98b389 SetEvent 11911->11913 11912->11883 11913->11883 11915 6c9987ef 11914->11915 11916 6c9506dc 11915->11916 11917 6c9506ea 11916->11917 11919 6c95071c 11916->11919 11920 6c97760e GetCurrentThreadId 11917->11920 11918 6c9506f6 11924 6c998a6a 11918->11924 11919->11918 11921 6c9504ed 136 API calls 11919->11921 11922 6c9506ef 11920->11922 11921->11918 11922->11918 11923 6c98b3e5 WaitForSingleObject 11922->11923 11923->11918 11925 6c9506dc 134 API calls 11924->11925 11926 6c998a76 11925->11926 11927 6c79be35 __VEC_memcpy 11926->11927 11928 6c998a84 ResetEvent 11927->11928 11929 6c92a7f6 8 API calls 11928->11929 11932 6c998a9b 11929->11932 11930 6c998acf 11931 6c9504a2 SetEvent 11930->11931 11933 6c998ad6 11931->11933 11932->11930 11934 6c9364c2 __VEC_memcpy 11932->11934 11933->11889 11935 6c998abf SetEvent 11934->11935 11935->11930 11937 6c9445a2 23 API calls 11936->11937 11938 6c8bcd67 11937->11938 11939 6c8bcd7f 11938->11939 11940 6c944301 6 API calls 11938->11940 11939->11893 11940->11939 11942 6c9442c6 23 API calls 11941->11942 11943 6c97fa6b 11942->11943 11943->11895 11945 6c97cd00 8 API calls 11944->11945 11946 6c97cd89 11945->11946 11951 6c92c2d8 11946->11951 11949 6c92c2a3 26 API calls 11950 6c97cda3 11949->11950 11950->11810 11952 6c92c2e1 11951->11952 11954 6c92c2ee 11951->11954 11952->11954 11955 6c97fb57 11952->11955 11954->11949 11956 6c97fb69 11955->11956 11957 6c97760e GetCurrentThreadId 11956->11957 11958 6c97fb78 11956->11958 11957->11958 11959 6c998adc 136 API calls 11958->11959 11960 6c97fb81 11958->11960 11959->11958 11960->11954 11962 6c921911 11961->11962 11963 6c921916 11961->11963 11964 6c8bcd4c 23 API calls 11962->11964 11963->11823 11964->11963 11966 6c97fbd3 11965->11966 11967 6c97fbce 11965->11967 11966->11817 11969 6c906c5d 11966->11969 11968 6c8bcd4c 23 API calls 11967->11968 11968->11966 11970 6c906c6b 11969->11970 11971 6c906c72 11969->11971 11970->11817 11981 6c9442e7 11971->11981 11976 6c9988ba 11973->11976 11974 6c9988e8 11974->11815 11975 6c9988ea SetEvent 11975->11974 11976->11974 11976->11975 11978 6c998913 11977->11978 11979 6c998950 11978->11979 11980 6c998927 SetEvent 11978->11980 11979->11815 11980->11979 11980->11980 11982 6c9442f1 11981->11982 11984 6c9442f6 11981->11984 11985 6c9373b6 11982->11985 11984->11970 11986 6c9373c6 11985->11986 11987 6c9373be 11985->11987 11986->11984 11988 6cc1e3bb ___free_lconv_num 6 API calls 11987->11988 11988->11986 11990 6c97d380 CoInitialize CoCreateInstance 11989->11990 11993 6c97d398 11989->11993 11990->11993 11991 6c97d463 CoUninitialize 11992 6c97d468 11991->11992 11992->11714 11994 6c980654 5 API calls 11993->11994 11997 6c97d3d2 11993->11997 11995 6c97d3cb 11994->11995 11996 6c926006 __VEC_memcpy 11995->11996 11996->11997 11997->11991 11997->11992 12065 6c980576 11998->12065 12000 6c97f78a 12000->11718 12000->11719 12000->11726 12002 6c980576 5 API calls 12001->12002 12003 6c97f7f3 12002->12003 12004 6c926006 12003->12004 12005 6c92601d GetFileAttributesExW 12004->12005 12006 6c926013 12004->12006 12005->11730 12007 6c925633 __VEC_memcpy 12006->12007 12007->12005 12009 6c97ff32 __VEC_memcpy 12008->12009 12010 6c97ffde 12009->12010 12010->11739 12012 6c97dddc 12011->12012 12013 6c980654 5 API calls 12012->12013 12018 6c97de0e 12012->12018 12014 6c97ddf2 12013->12014 12015 6c97d46d 3 API calls 12014->12015 12016 6c97ddf7 12015->12016 12017 6c97ffd2 __VEC_memcpy 12016->12017 12016->12018 12017->12018 12018->11736 12020 6c97ffd2 __VEC_memcpy 12019->12020 12021 6c97f5ae 12020->12021 12022 6c97f5b2 GetLogicalDrives 12021->12022 12023 6c97f60f 12021->12023 12025 6c9800d6 __VEC_memcpy 12022->12025 12024 6c980654 5 API calls 12023->12024 12026 6c97f61b 12024->12026 12027 6c97f5c6 12025->12027 12026->12027 12132 6c97f46e 12026->12132 12027->11739 12030 6c97ed3d 12029->12030 12031 6c97eb8a 12029->12031 12033 6c9800d6 __VEC_memcpy 12030->12033 12031->12030 12032 6c97eb97 12031->12032 12168 6c97e49a 12032->12168 12035 6c97ed5d 12033->12035 12202 6c925b4d 12035->12202 12039 6c97eb9c 12040 6c9800d6 __VEC_memcpy 12039->12040 12056 6c97ee86 12039->12056 12042 6c97ebcc 12040->12042 12041 6c97ed76 12044 6c980654 5 API calls 12041->12044 12054 6c97ee39 12041->12054 12043 6c926006 __VEC_memcpy 12042->12043 12057 6c97ebf1 12043->12057 12046 6c97ee2c 12044->12046 12045 6c980654 5 API calls 12047 6c97ee79 12045->12047 12048 6c926006 __VEC_memcpy 12046->12048 12049 6c926006 __VEC_memcpy 12047->12049 12050 6c97ee33 12048->12050 12051 6c97ee80 12049->12051 12210 6cc22eac 12050->12210 12053 6cc22eac 8 API calls 12051->12053 12053->12056 12054->12045 12054->12056 12055 6c97ed30 LocalFree 12055->12056 12056->11724 12057->12055 12057->12056 12059 6c97d473 12058->12059 12060 6c926006 __VEC_memcpy 12059->12060 12061 6c97d4e1 12059->12061 12062 6c97d4b7 FindFirstFileW 12060->12062 12061->11726 12062->12061 12063 6c97d4c2 FindClose 12062->12063 12064 6c97d4d4 12063->12064 12064->11726 12066 6c98058b 12065->12066 12074 6c9805ef 12065->12074 12066->12074 12075 6c9800f1 12066->12075 12071 6c9805b9 12087 6c92c519 12071->12087 12072 6c9805e5 12091 6c98111d 12072->12091 12074->12000 12076 6c97ff32 __VEC_memcpy 12075->12076 12077 6c9800fe 12076->12077 12078 6c980135 12077->12078 12101 6c94dcd8 12077->12101 12078->12071 12082 6c9804de 12078->12082 12081 6c94dcd8 __VEC_memcpy 12081->12078 12104 6c92c7a7 12082->12104 12084 6c9804ed 12086 6c98052f 12084->12086 12109 6c8e6b42 12084->12109 12086->12071 12088 6c92c539 12087->12088 12089 6c773614 __VEC_memcpy 12088->12089 12090 6c92c553 12088->12090 12089->12090 12090->12072 12092 6c98113e 12091->12092 12100 6c981142 12092->12100 12115 6c97e2ef 12092->12115 12094 6c9811bb 12129 6c773657 12094->12129 12095 6c98115c 12095->12094 12125 6c925804 12095->12125 12099 6c926de1 __VEC_memcpy 12099->12094 12100->12074 12102 6c773614 __VEC_memcpy 12101->12102 12103 6c94dce5 12102->12103 12103->12078 12103->12081 12105 6c97e00a GetCurrentDirectoryW GetCurrentDirectoryW __VEC_memcpy 12104->12105 12106 6c92c7b9 12105->12106 12107 6c9800d6 __VEC_memcpy 12106->12107 12108 6c92c7c1 12107->12108 12108->12084 12110 6c8e6b6b 12109->12110 12111 6c773614 __VEC_memcpy 12110->12111 12112 6c8e6b72 12111->12112 12113 6c7b980b __VEC_memcpy 12112->12113 12114 6c8e6b84 12113->12114 12114->12086 12116 6c97e328 12115->12116 12117 6c926006 __VEC_memcpy 12116->12117 12118 6c97e353 GetFullPathNameW 12117->12118 12119 6c97e361 12118->12119 12121 6c97e38a 12118->12121 12122 6c926006 __VEC_memcpy 12119->12122 12120 6c97e3e5 12120->12095 12121->12120 12123 6c92586e __VEC_memcpy 12121->12123 12124 6c97e384 GetFullPathNameW 12122->12124 12123->12120 12124->12121 12126 6c925812 _strlen 12125->12126 12127 6c925847 12125->12127 12126->12127 12128 6c925633 __VEC_memcpy 12126->12128 12127->12099 12128->12127 12130 6c925776 __VEC_memcpy 12129->12130 12131 6c773673 12130->12131 12131->12100 12139 6c9294ab 12132->12139 12134 6c97f48e 12138 6c97f4e5 12134->12138 12145 6c7c2e67 12134->12145 12138->12027 12144 6c9294cd 12139->12144 12140 6c929521 12141 6c925b87 __VEC_memcpy 12140->12141 12143 6c92953d 12140->12143 12141->12143 12142 6c925b87 __VEC_memcpy 12142->12144 12143->12134 12144->12140 12144->12142 12146 6c7c2e74 12145->12146 12147 6c773614 __VEC_memcpy 12146->12147 12148 6c7c2e89 12147->12148 12156 6c7861f4 12148->12156 12151 6c97f1c9 12160 6c97e206 12151->12160 12153 6c926006 __VEC_memcpy 12154 6c97f1d4 12153->12154 12154->12153 12155 6c97f27e 12154->12155 12155->12138 12157 6c786204 12156->12157 12158 6c773679 __VEC_memcpy 12157->12158 12159 6c786210 12158->12159 12159->12151 12161 6c97e21b 12160->12161 12164 6c97e237 12160->12164 12162 6c7a51c8 136 API calls 12161->12162 12161->12164 12163 6c97e296 12162->12163 12163->12164 12165 6c7a51f2 136 API calls 12163->12165 12164->12154 12166 6c97e2a7 12165->12166 12167 6c7a51f2 136 API calls 12166->12167 12167->12164 12169 6c97e4af 12168->12169 12200 6c97e6fb 12168->12200 12169->12200 12213 6c7a51c8 12169->12213 12172 6c97e554 12173 6c97e565 GetCurrentProcess 12172->12173 12188 6c97e616 12172->12188 12224 6c97e42e 12173->12224 12177 6c7a51f2 129 API calls 12179 6c97e530 12177->12179 12178 6c97e575 OpenProcessToken 12180 6c97e609 12178->12180 12181 6c97e589 GetTokenInformation 12178->12181 12182 6c7a51f2 129 API calls 12179->12182 12183 6c7a51f2 129 API calls 12180->12183 12184 6c97e601 CloseHandle 12181->12184 12185 6c97e5a1 12181->12185 12186 6c97e542 12182->12186 12183->12188 12184->12180 12190 6c97e5aa GetTokenInformation 12185->12190 12187 6c7a51f2 129 API calls 12186->12187 12187->12172 12189 6c7a51c8 129 API calls 12188->12189 12191 6c97e696 12189->12191 12192 6c97e5c3 GetLengthSid 12190->12192 12193 6c97e5e8 12190->12193 12196 6c7a51f2 129 API calls 12191->12196 12197 6c97e6a7 12191->12197 12194 6c93734a 12192->12194 12193->12184 12195 6c97e5d4 CopySid 12194->12195 12195->12193 12196->12197 12198 6c7a51c8 129 API calls 12197->12198 12199 6c97e6ea 12198->12199 12199->12200 12201 6c7a51f2 129 API calls 12199->12201 12200->12039 12201->12200 12203 6c925b71 12202->12203 12204 6c925b5a 12202->12204 12206 6c92781c 12203->12206 12204->12203 12253 6c92454b 12204->12253 12207 6c927840 12206->12207 12209 6c92782f 12206->12209 12208 6cc1b9e0 _realloc __VEC_memcpy 12207->12208 12207->12209 12208->12209 12209->12041 12257 6cc22e23 12210->12257 12212 6cc22ebc 12212->12054 12214 6c926006 __VEC_memcpy 12213->12214 12215 6c7a51d7 12214->12215 12228 6c952942 12215->12228 12217 6c7a51dd 12217->12172 12218 6c7a51f2 12217->12218 12219 6c7a51fb 12218->12219 12220 6c7a5202 12218->12220 12221 6c7a51c8 135 API calls 12219->12221 12222 6c7a5208 12220->12222 12223 6c7a520c GetProcAddress 12220->12223 12221->12220 12222->12177 12223->12222 12225 6c97e437 12224->12225 12227 6c97e469 12224->12227 12225->12227 12249 6c97d315 12225->12249 12227->12178 12229 6c952965 12228->12229 12239 6c952983 12228->12239 12230 6c950cdd 25 API calls 12229->12230 12232 6c952972 12230->12232 12231 6c9528bf GetSystemDirectoryW GetSystemDirectoryW 12236 6c9529c5 12231->12236 12233 6c938f25 135 API calls 12232->12233 12234 6c95297c 12233->12234 12235 6c9381d7 __VEC_memcpy 12234->12235 12235->12239 12237 6cc22520 _getenv 79 API calls 12236->12237 12242 6c952a1b 12236->12242 12238 6c9529f4 12237->12238 12241 6c9294ab __VEC_memcpy 12238->12241 12239->12231 12240 6c7873d6 __VEC_memcpy 12246 6c952a7a 12240->12246 12241->12242 12242->12240 12243 6c952b3b 12243->12217 12244 6c92586e __VEC_memcpy 12244->12246 12245 6c925776 __VEC_memcpy 12245->12246 12246->12243 12246->12244 12246->12245 12247 6c926006 __VEC_memcpy 12246->12247 12248 6c952b0c LoadLibraryW 12247->12248 12248->12243 12248->12246 12250 6c97d320 12249->12250 12251 6c97d331 FreeSid 12250->12251 12252 6c97d33e 12250->12252 12251->12252 12252->12227 12254 6c924555 12253->12254 12255 6c924568 12253->12255 12254->12203 12255->12254 12256 6cc1b9e0 _realloc __VEC_memcpy 12255->12256 12256->12254 12258 6cc22e54 12257->12258 12261 6cc22e30 __dosmaperr 12257->12261 12259 6cc22e5d GetFileAttributesW 12258->12259 12258->12261 12260 6cc22e6b GetLastError 12259->12260 12262 6cc22e4c __dosmaperr 12259->12262 12260->12262 12264 6cc266db 12261->12264 12262->12212 12265 6cc26a99 __decode_pointer 6 API calls 12264->12265 12266 6cc266eb __invoke_watson 12265->12266 12268 6c92bbe7 12267->12268 12287 6c92bb8c 12268->12287 12270 6c92bc19 12270->11743 12272 6c92aa72 __VEC_memcpy 12271->12272 12273 6c92ac88 12272->12273 12273->11745 12299 6c92b062 12274->12299 12276 6c92b32a 12276->11755 12277 6c92b334 12276->12277 12278 6c92b062 8 API calls 12277->12278 12279 6c92b33e 12278->12279 12279->11750 12279->11755 12281 6c92b062 8 API calls 12280->12281 12282 6c92b350 12281->12282 12283 6c93de60 12282->12283 12284 6c93de8f 12283->12284 12286 6c93de6e 12283->12286 12284->12286 12368 6c9867ac 12284->12368 12286->11755 12288 6c92bb97 12287->12288 12290 6c92bba4 12288->12290 12291 6c92afe8 12288->12291 12290->12270 12292 6c92aff1 12291->12292 12295 6c92aa72 12292->12295 12294 6c92b032 12294->12290 12297 6c92aa7e 12295->12297 12296 6c959fdd __VEC_memcpy 12298 6c98eea8 12296->12298 12297->12296 12298->12294 12300 6c92b07f 12299->12300 12307 6c92b154 12299->12307 12302 6c92b0a8 12300->12302 12313 6c92586e 12300->12313 12303 6c925b87 __VEC_memcpy 12302->12303 12304 6c92b112 12302->12304 12303->12304 12305 6c92b148 12304->12305 12312 6c92b159 12304->12312 12317 6c92aae4 12305->12317 12307->12276 12308 6c8253b4 __VEC_memcpy 12308->12312 12309 6c92aae4 8 API calls 12309->12312 12310 6c92b23e 12327 6c774e3d 12310->12327 12312->12307 12312->12308 12312->12309 12312->12310 12314 6c92587a 12313->12314 12315 6c92589a 12314->12315 12316 6c925633 __VEC_memcpy 12314->12316 12315->12302 12316->12315 12333 6c98ee89 12317->12333 12319 6c92aaf9 12336 6c92a05c 12319->12336 12322 6c92ac4d 12322->12307 12326 6c92ab1a 12326->12322 12340 6c92a17c 12326->12340 12348 6c925d13 12326->12348 12351 6c92a844 12326->12351 12357 6c92a7f6 12326->12357 12328 6c774e5a 12327->12328 12329 6c773614 __VEC_memcpy 12328->12329 12330 6c774e61 12329->12330 12365 6c774052 12330->12365 12334 6c959fdd __VEC_memcpy 12333->12334 12335 6c98eea8 12334->12335 12335->12319 12337 6c92a069 12336->12337 12338 6c92a08e 12337->12338 12339 6c926de1 __VEC_memcpy 12337->12339 12338->12326 12339->12338 12341 6c92a1a4 12340->12341 12342 6c92586e __VEC_memcpy 12341->12342 12343 6c92a1ef 12341->12343 12346 6c92a225 12341->12346 12342->12343 12344 6c925b87 __VEC_memcpy 12343->12344 12343->12346 12344->12346 12345 6c92a092 __VEC_memcpy 12345->12346 12346->12345 12347 6c92a289 12346->12347 12347->12326 12349 6c925cc4 __VEC_memcpy 12348->12349 12350 6c925d25 12349->12350 12350->12326 12352 6c92a856 12351->12352 12353 6c9294ab __VEC_memcpy 12352->12353 12356 6c92a899 12352->12356 12354 6c92a880 12353->12354 12355 6c9294ab __VEC_memcpy 12354->12355 12355->12356 12356->12326 12358 6c92a822 12357->12358 12359 6c92a806 12357->12359 12361 6cc1b9e0 _realloc __VEC_memcpy 12358->12361 12360 6c7721cb 7 API calls 12359->12360 12362 6c92a812 12360->12362 12364 6c92a81d 12361->12364 12363 6cc1b9e0 _realloc __VEC_memcpy 12362->12363 12363->12364 12364->12326 12366 6c773679 __VEC_memcpy 12365->12366 12367 6c774072 12366->12367 12367->12307 12369 6c9867e5 12368->12369 12371 6c9867f8 12369->12371 12372 6c96e84f 12369->12372 12371->12284 12373 6c96e865 12372->12373 12377 6c96f95c 12372->12377 12374 6c96f99f 12373->12374 12376 6cc1b9e0 _realloc __VEC_memcpy 12373->12376 12373->12377 12374->12377 12378 6c96e777 12374->12378 12376->12373 12377->12371 12379 6c96e788 12378->12379 12380 6c96e7e3 12379->12380 12381 6c96e7cb 12379->12381 12385 6c96e7a3 12379->12385 12383 6cc1b9e0 _realloc __VEC_memcpy 12380->12383 12382 6cc1b9e0 _realloc __VEC_memcpy 12381->12382 12382->12385 12384 6c96e805 12383->12384 12384->12385 12386 6cc1b9e0 _realloc __VEC_memcpy 12384->12386 12385->12377 12386->12385 12389 6c98324f 12387->12389 12388 6c98329a 12388->11762 12389->12388 12391 6c983274 12389->12391 12393 6c9831f0 12389->12393 12391->12388 12396 6c983211 12391->12396 12401 6c97faec 12393->12401 12397 6c97fbdf 7 API calls 12396->12397 12398 6c9831d6 12397->12398 12399 6c9831ef 12398->12399 12405 6c92d537 12398->12405 12399->12388 12402 6c97faf6 12401->12402 12403 6c97fb04 12402->12403 12404 6c97fa9f CreateEventW 12402->12404 12403->12391 12404->12403 12406 6c92d544 12405->12406 12409 6c944090 12406->12409 12408 6c92d56a 12408->12399 12411 6c944099 12409->12411 12410 6c9440ba 12410->12408 12411->12410 12412 6c9373b6 6 API calls 12411->12412 12412->12411 12418 6c825197 12413->12418 12419 6c773679 __VEC_memcpy 12418->12419 12420 6c8251a9 12419->12420 12421 6c773679 12420->12421 12422 6cc1b9e0 _realloc __VEC_memcpy 12421->12422 12423 6c773696 12422->12423 12423->11696 12425 6c97f9d1 12424->12425 12426 6c97f9c3 12424->12426 12428 6c97f9fc 12425->12428 12434 6c97f28e 12425->12434 12427 6c97f6ba 136 API calls 12426->12427 12427->12425 12428->11560 12430 6c97f9e9 12431 6c9800d6 __VEC_memcpy 12430->12431 12432 6c97f9f2 12431->12432 12457 6c98095f 12432->12457 12435 6c9800f1 __VEC_memcpy 12434->12435 12436 6c97f2ae 12435->12436 12437 6c97f2b6 12436->12437 12438 6c97f365 12436->12438 12482 6c980145 12437->12482 12439 6c92c7a7 3 API calls 12438->12439 12441 6c97f372 12439->12441 12443 6c9800d6 __VEC_memcpy 12441->12443 12445 6c97f38d 12443->12445 12444 6c97f2f8 12447 6c9800d6 __VEC_memcpy 12444->12447 12449 6c8253b4 __VEC_memcpy 12445->12449 12448 6c97f303 12447->12448 12451 6c97e2ef 3 API calls 12448->12451 12454 6c97f2d7 12449->12454 12451->12454 12452 6c97f2cc 12453 6c9800d6 __VEC_memcpy 12452->12453 12453->12454 12455 6c97f43d 12454->12455 12492 6c7aaf3d 12454->12492 12455->12430 12458 6c980976 12457->12458 12459 6c980987 12457->12459 12458->12428 12496 6c8eded3 12459->12496 12461 6c925b1b __VEC_memcpy 12475 6c9809d0 12461->12475 12463 6c980c37 12527 6cab1123 12463->12527 12468 6cab1123 6 API calls 12468->12458 12469 6c938f25 136 API calls 12469->12475 12472 6c8e6b42 __VEC_memcpy 12472->12475 12473 6c925b87 __VEC_memcpy 12473->12475 12475->12461 12475->12463 12475->12469 12475->12472 12475->12473 12476 6c92586e __VEC_memcpy 12475->12476 12477 6c8eda8b 23 API calls 12475->12477 12478 6c980c77 12475->12478 12499 6c938fe6 12475->12499 12502 6c938cb6 12475->12502 12506 6c938d0f 12475->12506 12510 6c9389ce 12475->12510 12516 6c938c5e 12475->12516 12521 6c925776 12475->12521 12476->12475 12477->12475 12479 6cab1123 6 API calls 12478->12479 12480 6c980cba 12479->12480 12481 6cab1123 6 API calls 12480->12481 12481->12458 12483 6c97ff32 __VEC_memcpy 12482->12483 12485 6c980152 12483->12485 12484 6c97f2bd 12484->12444 12489 6c980056 12484->12489 12485->12484 12486 6c94dcd8 __VEC_memcpy 12485->12486 12487 6c980185 12486->12487 12487->12484 12488 6c94dcd8 __VEC_memcpy 12487->12488 12488->12484 12490 6c97ff32 __VEC_memcpy 12489->12490 12491 6c97f2c8 12490->12491 12491->12444 12491->12452 12493 6c7aaf54 12492->12493 12495 6c7aaf4c 12492->12495 12494 6c773614 __VEC_memcpy 12493->12494 12494->12495 12495->12455 12531 6c8eda8b 12496->12531 12500 6c938f25 136 API calls 12499->12500 12501 6c939002 12500->12501 12501->12475 12503 6c938cc5 12502->12503 12504 6c938cc1 12502->12504 12503->12504 12505 6c97f6ba 136 API calls 12503->12505 12504->12475 12505->12504 12507 6c938d30 12506->12507 12509 6c938d1b 12506->12509 12567 6c9385d5 12507->12567 12509->12475 12511 6c9389f0 12510->12511 12514 6c9389db 12510->12514 12512 6c98063d 5 API calls 12511->12512 12513 6c9389f8 12512->12513 12513->12514 12515 6c9385d5 139 API calls 12513->12515 12514->12475 12515->12514 12517 6c938c68 12516->12517 12518 6c938c6c 12516->12518 12517->12475 12519 6c97f6ba 136 API calls 12518->12519 12520 6c938c92 12518->12520 12519->12520 12520->12475 12523 6c925787 12521->12523 12526 6c92578d 12521->12526 12522 6c9257c6 12524 6cc1b9e0 _realloc __VEC_memcpy 12522->12524 12523->12522 12525 6c925633 __VEC_memcpy 12523->12525 12523->12526 12524->12526 12525->12522 12526->12475 12528 6c980c4d 12527->12528 12529 6cab1131 12527->12529 12528->12468 12530 6c944301 6 API calls 12529->12530 12530->12528 12532 6c8eda9f 12531->12532 12535 6c8edaa4 12531->12535 12537 6c77c3d0 12532->12537 12534 6c8edae6 12534->12475 12535->12534 12542 6c845d85 12535->12542 12545 6c9445a2 12537->12545 12540 6c77c403 12540->12535 12543 6c9442c6 23 API calls 12542->12543 12544 6c845d91 12543->12544 12544->12534 12546 6c9445b3 12545->12546 12547 6c77c3eb 12546->12547 12553 6c9442c6 12546->12553 12547->12540 12549 6c944301 12547->12549 12550 6c944347 12549->12550 12551 6c94430f 12549->12551 12550->12540 12551->12550 12552 6c9442e7 6 API calls 12551->12552 12552->12551 12554 6c9442cc 12553->12554 12556 6c9442d8 12553->12556 12557 6c9373c8 12554->12557 12556->12546 12560 6c937354 12557->12560 12561 6c93735f 12560->12561 12562 6c937373 12561->12562 12563 6c937396 12561->12563 12564 6cc1e055 _realloc 23 API calls 12562->12564 12565 6cc1e055 _realloc 23 API calls 12563->12565 12566 6c93737d 12564->12566 12565->12566 12566->12556 12568 6c9385ea 12567->12568 12569 6c9387b7 12568->12569 12570 6c938636 12568->12570 12590 6c9385f5 12568->12590 12573 6c97f28e 5 API calls 12569->12573 12571 6c93863f 12570->12571 12572 6c93875c 12570->12572 12579 6c97f9a8 139 API calls 12571->12579 12571->12590 12601 6c97f8ff 12572->12601 12574 6c9387c4 12573->12574 12577 6c9800d6 __VEC_memcpy 12574->12577 12592 6c938801 12574->12592 12576 6c938771 12578 6c9800d6 __VEC_memcpy 12576->12578 12588 6c9387d8 12577->12588 12578->12590 12582 6c938691 12579->12582 12580 6c9800d6 __VEC_memcpy 12583 6c938830 12580->12583 12581 6c98035a __VEC_memcpy 12581->12590 12584 6c9800d6 __VEC_memcpy 12582->12584 12595 6c9386cf 12582->12595 12583->12581 12583->12590 12593 6c9386a6 12584->12593 12585 6c938717 12587 6c98035a __VEC_memcpy 12585->12587 12586 6c9386f5 12589 6c9800d6 __VEC_memcpy 12586->12589 12587->12590 12591 6c98035a __VEC_memcpy 12588->12591 12589->12590 12590->12509 12591->12592 12592->12580 12592->12583 12596 6c98035a 12593->12596 12595->12585 12595->12586 12610 6c9801c5 12596->12610 12599 6c980385 12599->12595 12600 6c925b1b __VEC_memcpy 12600->12599 12602 6c97f926 12601->12602 12603 6c97f918 12601->12603 12605 6c97f943 12602->12605 12606 6c97f952 12602->12606 12604 6c97f6ba 136 API calls 12603->12604 12604->12602 12607 6c97d33f 9 API calls 12605->12607 12609 6c97f94f 12606->12609 12616 6c97e72a 12606->12616 12607->12609 12609->12576 12611 6c9801d4 12610->12611 12612 6c980200 12610->12612 12613 6c97ff32 __VEC_memcpy 12611->12613 12612->12599 12612->12600 12614 6c9801da 12613->12614 12614->12612 12615 6c94dcd8 __VEC_memcpy 12614->12615 12615->12614 12617 6c980654 5 API calls 12616->12617 12618 6c97e75c 12617->12618 12619 6c926006 __VEC_memcpy 12618->12619 12620 6c97e763 CreateFileW 12619->12620 12621 6c97e778 12620->12621 12622 6c97e990 12621->12622 12623 6c97e798 DeviceIoControl 12621->12623 12622->12609 12626 6c97e7be 12623->12626 12630 6c97e847 12623->12630 12624 6c97e86a CloseHandle 12625 6c97e49a 136 API calls 12624->12625 12628 6c97e878 12625->12628 12627 6c925b87 __VEC_memcpy 12626->12627 12626->12630 12627->12630 12628->12622 12641 6c96b68c 12628->12641 12630->12624 12631 6c97e8a7 12645 6c96b81d 12631->12645 12642 6c96b6a4 12641->12642 12643 6c96b701 12642->12643 12658 6c96b5ad 12642->12658 12643->12631 12698 6c96b62f 12645->12698 12659 6c96b5bd 12658->12659 12667 6c96b618 12658->12667 12672 6c96b32b 12659->12672 12661 6c96b62d 12661->12643 12662 6c96b5c2 12666 6c96b5e4 12662->12666 12676 6c964c3e 12662->12676 12665 6c96b5cb 12669 6c96b32b 23 API calls 12665->12669 12666->12667 12687 6c96b4a2 12666->12687 12667->12661 12694 6c96426d 12667->12694 12670 6c96b5dd 12669->12670 12680 6c96a4ad 12670->12680 12673 6c96b379 12672->12673 12674 6c96b334 12672->12674 12673->12662 12674->12673 12675 6c96a925 23 API calls 12674->12675 12675->12673 12677 6c964c47 12676->12677 12679 6c964c65 12676->12679 12678 6c950434 CreateEventW 12677->12678 12677->12679 12678->12679 12679->12665 12681 6c9654c2 23 API calls 12680->12681 12682 6c96a4c6 12681->12682 12683 6c965df3 23 API calls 12682->12683 12684 6c96a4d1 12683->12684 12685 6c96a4d8 12684->12685 12686 6c969771 23 API calls 12684->12686 12685->12666 12686->12685 12688 6c964ab2 __VEC_memcpy 12687->12688 12689 6c96b552 12688->12689 12690 6c964221 __VEC_memcpy 12689->12690 12691 6c96b55f 12690->12691 12692 6c96b0d7 23 API calls 12691->12692 12693 6c96b574 12692->12693 12693->12667 12695 6c96429b 12694->12695 12696 6cc1e055 _realloc 23 API calls 12695->12696 12697 6c9642cb _memset 12696->12697 12697->12661 12699 6c96b637 12698->12699 12700 6c96b63c 12698->12700 12701 6c96b5ad 24 API calls 12699->12701 12702 6c96426d 23 API calls 12700->12702 12701->12700 12703 6c96b646 12702->12703 12751 6c938a46 12750->12751 12752 6c938a4a 12750->12752 12751->11566 12753 6c938a70 12752->12753 12754 6c97f6ba 136 API calls 12752->12754 12753->11566 12754->12753 12763 6cc384fe 12768 6cc1ee64 12763->12768 12769 6cc1ee77 12768->12769 12775 6cc1eec4 12768->12775 12816 6cc26d22 12769->12816 12772 6cc1eea4 12772->12775 12833 6cc2d8e5 12772->12833 12776 6cc3818e 12775->12776 12777 6cc381ba CompareStringW 12776->12777 12778 6cc381d1 strncnt 12776->12778 12777->12778 12779 6cc381dd GetLastError 12777->12779 12781 6cc38437 12778->12781 12787 6cc38246 12778->12787 12800 6cc38223 12778->12800 12779->12778 12780 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 12782 6cc384fc 12780->12782 13150 6cc37110 GetLocaleInfoA 12781->13150 12785 6cc38304 MultiByteToWideChar 12795 6cc38324 12785->12795 12785->12800 12786 6cc384be CompareStringA 12789 6cc384dc 12786->12789 12786->12800 12787->12785 12790 6cc38288 GetCPInfo 12787->12790 12787->12800 12792 6cc1e3bb ___free_lconv_num 6 API calls 12789->12792 12793 6cc38299 12790->12793 12790->12800 12796 6cc384e2 12792->12796 12793->12785 12793->12800 12794 6cc3837b MultiByteToWideChar 12797 6cc38425 12794->12797 12798 6cc38394 MultiByteToWideChar 12794->12798 12801 6cc1e2bf __crtGetStringTypeA_stat 6 API calls 12795->12801 12807 6cc38341 __crtGetStringTypeA_stat 12795->12807 12802 6cc1e3bb ___free_lconv_num 6 API calls 12796->12802 12804 6cc25414 __freea 6 API calls 12797->12804 12798->12797 12810 6cc383ab 12798->12810 12799 6cc37159 ___convertcp 24 API calls 12803 6cc384a3 12799->12803 12800->12780 12801->12807 12802->12800 12805 6cc384b8 12803->12805 12806 6cc384ac 12803->12806 12804->12800 12805->12786 12808 6cc1e3bb ___free_lconv_num 6 API calls 12806->12808 12807->12794 12807->12800 12808->12800 12809 6cc383f5 MultiByteToWideChar 12811 6cc38408 CompareStringW 12809->12811 12812 6cc3841f 12809->12812 12813 6cc383c1 __crtGetStringTypeA_stat 12810->12813 12814 6cc1e2bf __crtGetStringTypeA_stat 6 API calls 12810->12814 12811->12812 13146 6cc25414 12812->13146 12813->12797 12813->12809 12814->12813 12817 6cc26d2a 12816->12817 12818 6cc1ee7c 12817->12818 12847 6cc20f47 12817->12847 12818->12772 12820 6cc2e051 12818->12820 12821 6cc2e05d _getenv 12820->12821 12822 6cc26d22 __getptd 29 API calls 12821->12822 12823 6cc2e062 12822->12823 12824 6cc2e074 12823->12824 12826 6cc2e090 12823->12826 12825 6cc26d22 __getptd 29 API calls 12824->12825 12827 6cc2e079 12825->12827 12962 6cc2e013 12826->12962 12831 6cc2e087 _getenv 12827->12831 12832 6cc20f47 __amsg_exit 29 API calls 12827->12832 12831->12772 12832->12831 12834 6cc2d8f1 _getenv 12833->12834 12835 6cc26d22 __getptd 29 API calls 12834->12835 12837 6cc2d8f6 12835->12837 12836 6cc2d908 12839 6cc2d916 _getenv 12836->12839 12841 6cc20f47 __amsg_exit 29 API calls 12836->12841 12837->12836 12838 6cc2d96f 12837->12838 12842 6cc2d957 InterlockedIncrement 12837->12842 12843 6cc2d93d InterlockedDecrement 12837->12843 13142 6cc2d980 12838->13142 12839->12775 12841->12839 12842->12838 12843->12842 12844 6cc2d948 12843->12844 12844->12842 12845 6cc1e3bb ___free_lconv_num 6 API calls 12844->12845 12846 6cc2d956 12845->12846 12846->12842 12854 6cc28e3c 12847->12854 12852 6cc26a99 __decode_pointer 6 API calls 12853 6cc20f64 12852->12853 12853->12818 12897 6cc368ef 12854->12897 12856 6cc28e43 12857 6cc368ef __set_error_mode 6 API calls 12856->12857 12859 6cc28e50 12856->12859 12857->12859 12858 6cc28c91 __NMSG_WRITE 29 API calls 12860 6cc28e68 12858->12860 12859->12858 12861 6cc20f51 12859->12861 12862 6cc28c91 __NMSG_WRITE 29 API calls 12860->12862 12863 6cc28c91 12861->12863 12862->12861 12864 6cc28ca5 12863->12864 12865 6cc368ef __set_error_mode 6 API calls 12864->12865 12895 6cc20f59 12864->12895 12866 6cc28cc7 12865->12866 12867 6cc28e05 GetStdHandle 12866->12867 12869 6cc368ef __set_error_mode 6 API calls 12866->12869 12868 6cc28e13 _strlen 12867->12868 12867->12895 12872 6cc28e2c WriteFile 12868->12872 12868->12895 12870 6cc28cd8 12869->12870 12870->12867 12871 6cc28cea 12870->12871 12871->12895 12901 6cc1f8f6 12871->12901 12872->12895 12875 6cc28d20 GetModuleFileNameA 12876 6cc28d3e 12875->12876 12881 6cc28d61 _strlen 12875->12881 12878 6cc1f8f6 _strcpy_s 6 API calls 12876->12878 12880 6cc28d4e 12878->12880 12880->12881 12883 6cc265b3 __invoke_watson 10 API calls 12880->12883 12882 6cc28da4 12881->12882 12912 6cc20ce1 12881->12912 12916 6cc3687b 12882->12916 12883->12881 12887 6cc28dc8 12890 6cc3687b _strcat_s 6 API calls 12887->12890 12889 6cc265b3 __invoke_watson 10 API calls 12889->12887 12892 6cc28ddc 12890->12892 12891 6cc265b3 __invoke_watson 10 API calls 12891->12882 12894 6cc265b3 __invoke_watson 10 API calls 12892->12894 12896 6cc28ded 12892->12896 12894->12896 12895->12852 12920 6cc36712 12896->12920 12898 6cc368fe 12897->12898 12899 6cc266db strtoxl 6 API calls 12898->12899 12900 6cc36908 12898->12900 12899->12900 12900->12856 12902 6cc1f907 12901->12902 12903 6cc266db strtoxl 6 API calls 12902->12903 12904 6cc1f922 12902->12904 12903->12904 12904->12875 12905 6cc265b3 12904->12905 12947 6cc1c040 12905->12947 12907 6cc265e0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12908 6cc266bc GetCurrentProcess TerminateProcess 12907->12908 12911 6cc266b0 __invoke_watson 12907->12911 12909 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 12908->12909 12910 6cc266d9 12909->12910 12910->12875 12911->12908 12915 6cc20cf3 12912->12915 12913 6cc20cfc 12913->12882 12913->12891 12914 6cc266db strtoxl 6 API calls 12914->12913 12915->12913 12915->12914 12919 6cc3688c 12916->12919 12917 6cc266db strtoxl 6 API calls 12918 6cc28db7 12917->12918 12918->12887 12918->12889 12919->12917 12919->12918 12949 6cc26a90 12920->12949 12923 6cc36735 LoadLibraryA 12925 6cc3685f 12923->12925 12926 6cc3674a GetProcAddress 12923->12926 12924 6cc367bd 12931 6cc26a99 __decode_pointer 6 API calls 12924->12931 12942 6cc367e7 12924->12942 12925->12895 12926->12925 12928 6cc36760 12926->12928 12927 6cc36812 12929 6cc26a99 __decode_pointer 6 API calls 12927->12929 12952 6cc26a1e TlsGetValue 12928->12952 12929->12925 12930 6cc26a99 __decode_pointer 6 API calls 12941 6cc3682a 12930->12941 12933 6cc367da 12931->12933 12935 6cc26a99 __decode_pointer 6 API calls 12933->12935 12935->12942 12936 6cc26a1e __encode_pointer 6 API calls 12937 6cc3677b GetProcAddress 12936->12937 12938 6cc26a1e __encode_pointer 6 API calls 12937->12938 12939 6cc36790 GetProcAddress 12938->12939 12940 6cc26a1e __encode_pointer 6 API calls 12939->12940 12943 6cc367a5 12940->12943 12941->12927 12944 6cc26a99 __decode_pointer 6 API calls 12941->12944 12942->12927 12942->12930 12943->12924 12945 6cc367af GetProcAddress 12943->12945 12944->12927 12946 6cc26a1e __encode_pointer 6 API calls 12945->12946 12946->12924 12948 6cc1c04c __VEC_memzero 12947->12948 12948->12907 12950 6cc26a1e __encode_pointer 6 API calls 12949->12950 12951 6cc26a97 12950->12951 12951->12923 12951->12924 12953 6cc26a36 12952->12953 12954 6cc26a57 GetModuleHandleW 12952->12954 12953->12954 12955 6cc26a40 TlsGetValue 12953->12955 12956 6cc26a72 GetProcAddress 12954->12956 12957 6cc26a67 12954->12957 12960 6cc26a4b 12955->12960 12959 6cc26a4f GetProcAddress 12956->12959 12958 6cc20f17 __crt_waiting_on_module_handle 2 API calls 12957->12958 12961 6cc26a6d 12958->12961 12959->12936 12960->12954 12960->12959 12961->12956 12961->12959 12963 6cc2e017 12962->12963 12964 6cc2e049 12962->12964 12963->12964 12973 6cc2deeb InterlockedIncrement 12963->12973 12970 6cc2e0bb 12964->12970 12966 6cc2e02a 12966->12964 12985 6cc2df7a 12966->12985 13141 6cc29c2d LeaveCriticalSection 12970->13141 12972 6cc2e0c2 12972->12827 12974 6cc2df09 InterlockedIncrement 12973->12974 12975 6cc2df0c 12973->12975 12974->12975 12976 6cc2df16 InterlockedIncrement 12975->12976 12977 6cc2df19 12975->12977 12976->12977 12978 6cc2df23 InterlockedIncrement 12977->12978 12979 6cc2df26 12977->12979 12978->12979 12980 6cc2df30 InterlockedIncrement 12979->12980 12982 6cc2df33 12979->12982 12980->12982 12981 6cc2df4c InterlockedIncrement 12981->12982 12982->12981 12983 6cc2df67 InterlockedIncrement 12982->12983 12984 6cc2df5c InterlockedIncrement 12982->12984 12983->12966 12984->12982 12986 6cc2df8b InterlockedDecrement 12985->12986 12987 6cc2e00e 12985->12987 12988 6cc2dfa3 12986->12988 12989 6cc2dfa0 InterlockedDecrement 12986->12989 12987->12964 12999 6cc2dda2 12987->12999 12990 6cc2dfb0 12988->12990 12991 6cc2dfad InterlockedDecrement 12988->12991 12989->12988 12992 6cc2dfba InterlockedDecrement 12990->12992 12993 6cc2dfbd 12990->12993 12991->12990 12992->12993 12994 6cc2dfc7 InterlockedDecrement 12993->12994 12995 6cc2dfca 12993->12995 12994->12995 12996 6cc2dfe3 InterlockedDecrement 12995->12996 12997 6cc2dff3 InterlockedDecrement 12995->12997 12998 6cc2dffe InterlockedDecrement 12995->12998 12996->12995 12997->12995 12998->12987 13000 6cc2ddb9 12999->13000 13026 6cc2de26 12999->13026 13003 6cc2dded 13000->13003 13011 6cc1e3bb ___free_lconv_num 6 API calls 13000->13011 13000->13026 13001 6cc2de73 13013 6cc2de9a 13001->13013 13053 6cc36e12 13001->13053 13002 6cc1e3bb ___free_lconv_num 6 API calls 13005 6cc2de47 13002->13005 13007 6cc2de0e 13003->13007 13018 6cc1e3bb ___free_lconv_num 6 API calls 13003->13018 13008 6cc1e3bb ___free_lconv_num 6 API calls 13005->13008 13009 6cc1e3bb ___free_lconv_num 6 API calls 13007->13009 13014 6cc2de5a 13008->13014 13015 6cc2de1b 13009->13015 13010 6cc2dedf 13016 6cc1e3bb ___free_lconv_num 6 API calls 13010->13016 13017 6cc2dde2 13011->13017 13012 6cc1e3bb ___free_lconv_num 6 API calls 13012->13013 13013->13010 13019 6cc1e3bb 6 API calls ___free_lconv_num 13013->13019 13020 6cc1e3bb ___free_lconv_num 6 API calls 13014->13020 13021 6cc1e3bb ___free_lconv_num 6 API calls 13015->13021 13022 6cc2dee5 13016->13022 13029 6cc36fee 13017->13029 13024 6cc2de03 13018->13024 13019->13013 13025 6cc2de68 13020->13025 13021->13026 13022->12964 13045 6cc36fa7 13024->13045 13028 6cc1e3bb ___free_lconv_num 6 API calls 13025->13028 13026->13001 13026->13002 13028->13001 13030 6cc36ffb 13029->13030 13044 6cc37078 13029->13044 13031 6cc3700c 13030->13031 13032 6cc1e3bb ___free_lconv_num 6 API calls 13030->13032 13033 6cc3701e 13031->13033 13034 6cc1e3bb ___free_lconv_num 6 API calls 13031->13034 13032->13031 13035 6cc37030 13033->13035 13036 6cc1e3bb ___free_lconv_num 6 API calls 13033->13036 13034->13033 13037 6cc1e3bb ___free_lconv_num 6 API calls 13035->13037 13039 6cc37042 13035->13039 13036->13035 13037->13039 13038 6cc1e3bb ___free_lconv_num 6 API calls 13040 6cc37054 13038->13040 13039->13038 13039->13040 13041 6cc1e3bb ___free_lconv_num 6 API calls 13040->13041 13042 6cc37066 13040->13042 13041->13042 13043 6cc1e3bb ___free_lconv_num 6 API calls 13042->13043 13042->13044 13043->13044 13044->13003 13046 6cc36fb4 13045->13046 13052 6cc36fe8 13045->13052 13047 6cc1e3bb ___free_lconv_num 6 API calls 13046->13047 13048 6cc36fc4 13046->13048 13047->13048 13049 6cc36fd6 13048->13049 13050 6cc1e3bb ___free_lconv_num 6 API calls 13048->13050 13051 6cc1e3bb ___free_lconv_num 6 API calls 13049->13051 13049->13052 13050->13049 13051->13052 13052->13007 13054 6cc36e23 13053->13054 13140 6cc2de93 13053->13140 13055 6cc1e3bb ___free_lconv_num 6 API calls 13054->13055 13056 6cc36e2b 13055->13056 13057 6cc1e3bb ___free_lconv_num 6 API calls 13056->13057 13058 6cc36e33 13057->13058 13059 6cc1e3bb ___free_lconv_num 6 API calls 13058->13059 13060 6cc36e3b 13059->13060 13061 6cc1e3bb ___free_lconv_num 6 API calls 13060->13061 13062 6cc36e43 13061->13062 13063 6cc1e3bb ___free_lconv_num 6 API calls 13062->13063 13064 6cc36e4b 13063->13064 13065 6cc1e3bb ___free_lconv_num 6 API calls 13064->13065 13066 6cc36e53 13065->13066 13067 6cc1e3bb ___free_lconv_num 6 API calls 13066->13067 13068 6cc36e5a 13067->13068 13069 6cc1e3bb ___free_lconv_num 6 API calls 13068->13069 13070 6cc36e62 13069->13070 13071 6cc1e3bb ___free_lconv_num 6 API calls 13070->13071 13072 6cc36e6a 13071->13072 13073 6cc1e3bb ___free_lconv_num 6 API calls 13072->13073 13074 6cc36e72 13073->13074 13075 6cc1e3bb ___free_lconv_num 6 API calls 13074->13075 13076 6cc36e7a 13075->13076 13077 6cc1e3bb ___free_lconv_num 6 API calls 13076->13077 13078 6cc36e82 13077->13078 13079 6cc1e3bb ___free_lconv_num 6 API calls 13078->13079 13080 6cc36e8a 13079->13080 13081 6cc1e3bb ___free_lconv_num 6 API calls 13080->13081 13082 6cc36e92 13081->13082 13083 6cc1e3bb ___free_lconv_num 6 API calls 13082->13083 13084 6cc36e9a 13083->13084 13085 6cc1e3bb ___free_lconv_num 6 API calls 13084->13085 13086 6cc36ea2 13085->13086 13087 6cc1e3bb ___free_lconv_num 6 API calls 13086->13087 13088 6cc36ead 13087->13088 13089 6cc1e3bb ___free_lconv_num 6 API calls 13088->13089 13090 6cc36eb5 13089->13090 13091 6cc1e3bb ___free_lconv_num 6 API calls 13090->13091 13092 6cc36ebd 13091->13092 13093 6cc1e3bb ___free_lconv_num 6 API calls 13092->13093 13094 6cc36ec5 13093->13094 13095 6cc1e3bb ___free_lconv_num 6 API calls 13094->13095 13096 6cc36ecd 13095->13096 13097 6cc1e3bb ___free_lconv_num 6 API calls 13096->13097 13098 6cc36ed5 13097->13098 13099 6cc1e3bb ___free_lconv_num 6 API calls 13098->13099 13100 6cc36edd 13099->13100 13101 6cc1e3bb ___free_lconv_num 6 API calls 13100->13101 13102 6cc36ee5 13101->13102 13103 6cc1e3bb ___free_lconv_num 6 API calls 13102->13103 13104 6cc36eed 13103->13104 13105 6cc1e3bb ___free_lconv_num 6 API calls 13104->13105 13106 6cc36ef5 13105->13106 13107 6cc1e3bb ___free_lconv_num 6 API calls 13106->13107 13108 6cc36efd 13107->13108 13109 6cc1e3bb ___free_lconv_num 6 API calls 13108->13109 13110 6cc36f05 13109->13110 13111 6cc1e3bb ___free_lconv_num 6 API calls 13110->13111 13112 6cc36f0d 13111->13112 13113 6cc1e3bb ___free_lconv_num 6 API calls 13112->13113 13114 6cc36f15 13113->13114 13115 6cc1e3bb ___free_lconv_num 6 API calls 13114->13115 13116 6cc36f1d 13115->13116 13117 6cc1e3bb ___free_lconv_num 6 API calls 13116->13117 13118 6cc36f25 13117->13118 13119 6cc1e3bb ___free_lconv_num 6 API calls 13118->13119 13120 6cc36f33 13119->13120 13121 6cc1e3bb ___free_lconv_num 6 API calls 13120->13121 13122 6cc36f3e 13121->13122 13123 6cc1e3bb ___free_lconv_num 6 API calls 13122->13123 13124 6cc36f49 13123->13124 13125 6cc1e3bb ___free_lconv_num 6 API calls 13124->13125 13126 6cc36f54 13125->13126 13127 6cc1e3bb ___free_lconv_num 6 API calls 13126->13127 13128 6cc36f5f 13127->13128 13129 6cc1e3bb ___free_lconv_num 6 API calls 13128->13129 13130 6cc36f6a 13129->13130 13131 6cc1e3bb ___free_lconv_num 6 API calls 13130->13131 13132 6cc36f75 13131->13132 13133 6cc1e3bb ___free_lconv_num 6 API calls 13132->13133 13134 6cc36f80 13133->13134 13135 6cc1e3bb ___free_lconv_num 6 API calls 13134->13135 13136 6cc36f8b 13135->13136 13137 6cc1e3bb ___free_lconv_num 6 API calls 13136->13137 13138 6cc36f96 13137->13138 13139 6cc1e3bb ___free_lconv_num 6 API calls 13138->13139 13139->13140 13140->13012 13141->12972 13145 6cc29c2d LeaveCriticalSection 13142->13145 13144 6cc2d987 13144->12836 13145->13144 13147 6cc25431 13146->13147 13148 6cc25420 13146->13148 13147->12797 13148->13147 13149 6cc1e3bb ___free_lconv_num 6 API calls 13148->13149 13149->13147 13151 6cc37143 13150->13151 13152 6cc3713e 13150->13152 13179 6cc206be 13151->13179 13154 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13152->13154 13155 6cc37157 13154->13155 13155->12786 13155->12800 13156 6cc37159 13155->13156 13157 6cc37199 GetCPInfo 13156->13157 13160 6cc37223 13156->13160 13158 6cc371b0 13157->13158 13159 6cc3720e MultiByteToWideChar 13157->13159 13158->13159 13162 6cc371b6 GetCPInfo 13158->13162 13159->13160 13161 6cc371c9 _strlen 13159->13161 13163 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13160->13163 13166 6cc1e2bf __crtGetStringTypeA_stat 6 API calls 13161->13166 13170 6cc371fb _memset __crtGetStringTypeA_stat 13161->13170 13162->13159 13165 6cc371c3 13162->13165 13164 6cc3730b 13163->13164 13164->12799 13164->12800 13165->13159 13165->13161 13166->13170 13167 6cc37258 MultiByteToWideChar 13168 6cc37270 13167->13168 13169 6cc3728f 13167->13169 13172 6cc37277 WideCharToMultiByte 13168->13172 13173 6cc37294 13168->13173 13171 6cc25414 __freea 6 API calls 13169->13171 13170->13160 13170->13167 13171->13160 13172->13169 13174 6cc372b3 13173->13174 13175 6cc3729f WideCharToMultiByte 13173->13175 13174->13169 13176 6cc372c4 WideCharToMultiByte 13174->13176 13175->13169 13175->13174 13176->13169 13177 6cc372d6 13176->13177 13178 6cc1e3bb ___free_lconv_num 6 API calls 13177->13178 13178->13169 13182 6cc262ab 13179->13182 13183 6cc262c4 13182->13183 13186 6cc2607c 13183->13186 13185 6cc206cf 13185->13152 13187 6cc1ee64 _LocaleUpdate::_LocaleUpdate 53 API calls 13186->13187 13188 6cc26091 13187->13188 13189 6cc260a3 13188->13189 13192 6cc260e0 13188->13192 13190 6cc266db strtoxl 6 API calls 13189->13190 13193 6cc260b8 13190->13193 13192->13193 13194 6cc2e4fc 13192->13194 13193->13185 13195 6cc1ee64 _LocaleUpdate::_LocaleUpdate 53 API calls 13194->13195 13196 6cc2e510 13195->13196 13197 6cc2e51d 13196->13197 13201 6cc2e4b1 13196->13201 13197->13192 13202 6cc1ee64 _LocaleUpdate::_LocaleUpdate 53 API calls 13201->13202 13203 6cc2e4c4 13202->13203 13204 6cc36dd0 13203->13204 13205 6cc1ee64 _LocaleUpdate::_LocaleUpdate 53 API calls 13204->13205 13206 6cc36de3 13205->13206 13209 6cc36c16 13206->13209 13210 6cc36c62 13209->13210 13211 6cc36c37 GetStringTypeW 13209->13211 13213 6cc36c4f 13210->13213 13214 6cc36d49 13210->13214 13212 6cc36c57 GetLastError 13211->13212 13211->13213 13212->13210 13215 6cc36c9b MultiByteToWideChar 13213->13215 13232 6cc36d43 13213->13232 13216 6cc37110 ___ansicp 61 API calls 13214->13216 13221 6cc36cc8 13215->13221 13215->13232 13218 6cc36d6d 13216->13218 13217 6cc1b4e4 __crtGetStringTypeA_stat 5 API calls 13219 6cc36dce 13217->13219 13220 6cc36d9a GetStringTypeA 13218->13220 13222 6cc37159 ___convertcp 24 API calls 13218->13222 13218->13232 13219->13197 13224 6cc36db5 13220->13224 13220->13232 13225 6cc36cdd _memset __crtGetStringTypeA_stat 13221->13225 13226 6cc1e2bf __crtGetStringTypeA_stat 6 API calls 13221->13226 13227 6cc36d8e 13222->13227 13223 6cc36d16 MultiByteToWideChar 13228 6cc36d3d 13223->13228 13229 6cc36d2c GetStringTypeW 13223->13229 13230 6cc1e3bb ___free_lconv_num 6 API calls 13224->13230 13225->13223 13225->13232 13226->13225 13227->13220 13227->13232 13231 6cc25414 __freea 6 API calls 13228->13231 13229->13228 13230->13232 13231->13232 13232->13217

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(?), ref: 6C7721EA
                                                                                    • LocalAlloc.KERNELBASE(6C921F05,?), ref: 6C772242
                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000), ref: 6C772327
                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 6C77239E
                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 6C772458
                                                                                    • VirtualProtect.KERNELBASE(?,?,00000001,?), ref: 6C7724C9
                                                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 6C7724F0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileProtectVirtual$AllocCreateHandleLibraryLoadLocalModuleRead
                                                                                    • String ID:
                                                                                    • API String ID: 1028030788-0
                                                                                    • Opcode ID: 05bc1005d9a7a71d15a7eb900e4d62e01fefbeaa5ebc941a13375332998bf681
                                                                                    • Instruction ID: 2dcc1074f4a9f7c8d12fb6f6049d2707f996db463fa0fe502b64429c7295d11a
                                                                                    • Opcode Fuzzy Hash: 05bc1005d9a7a71d15a7eb900e4d62e01fefbeaa5ebc941a13375332998bf681
                                                                                    • Instruction Fuzzy Hash: 53E18BB5A00248DFCB58CFA8C994A9E7BB5BF88304F248259FD2987355D731E945CFA0

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 6CC2692C
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CC26941
                                                                                    • UnhandledExceptionFilter.KERNEL32(6CDF08B4), ref: 6CC2694C
                                                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 6CC26968
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 6CC2696F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 2579439406-0
                                                                                    • Opcode ID: 0aa11fd2feef42192829d16dcca317d581cdbd4ba9a2fbeec0c104bc5065872b
                                                                                    • Instruction ID: 10c1a719af6da97be7144bbfb9532381cda828f5ed653ce1ef1671e7d5119726
                                                                                    • Opcode Fuzzy Hash: 0aa11fd2feef42192829d16dcca317d581cdbd4ba9a2fbeec0c104bc5065872b
                                                                                    • Instruction Fuzzy Hash: BB21FFB8B11205CFCF51DF25D684A647BB5FB0A314F10546AE409E7F90E7B09A80CF69
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,00000000,00000008,00000007,00000000,00000003,02200000,00000000), ref: 6C97E764
                                                                                    • DeviceIoControl.KERNEL32(000000FF,000900A8,00000000,00000000,00000000,00004000,00000040,00000000), ref: 6C97E7B1
                                                                                    • CloseHandle.KERNEL32(000000FF,00010000,00000001,00000000,00000000,00000008,00000007,00000000,00000003,02200000,00000000), ref: 6C97E86E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                                    • String ID:
                                                                                    • API String ID: 33631002-0
                                                                                    • Opcode ID: a52d959dff912986fb20e584fcbeddc23a72aa29658f107f4da29d03a8004f6f
                                                                                    • Instruction ID: 873501d38581b81b91b4b0fcb12a6595e378bb5064787471b70dbf4b291fa028
                                                                                    • Opcode Fuzzy Hash: a52d959dff912986fb20e584fcbeddc23a72aa29658f107f4da29d03a8004f6f
                                                                                    • Instruction Fuzzy Hash: EB719571911104AFDB15DBA9CC81DEEB7BCEF15318F100299F152E7AA0EB34DA48DBA0
                                                                                    APIs
                                                                                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,6C9504FB,00000004), ref: 6C97761D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoSystem
                                                                                    • String ID:
                                                                                    • API String ID: 31276548-0
                                                                                    • Opcode ID: 942ac2bb0e7b2143cc17d233f7c2176543147785e36ab9be803eca66eca40177
                                                                                    • Instruction ID: ce0f66c24dc9ce01cafe28fd83d32e425ba4a24f479e155558217643e5b4bb23
                                                                                    • Opcode Fuzzy Hash: 942ac2bb0e7b2143cc17d233f7c2176543147785e36ab9be803eca66eca40177
                                                                                    • Instruction Fuzzy Hash: 7FB092B090820E97CA00E6EA99968CEB3FCAA08208B400461D511A3A40F660F94E8BA1

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000001,00000004,00000000,00000000,00000000), ref: 6C97E566
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,00000004,00000000,00000001,00000004,00000000,00000000,00000000), ref: 6C97E57C
                                                                                    • GetTokenInformation.ADVAPI32(00000004,00000001(TokenIntegrityLevel),00000000,00000000,6CD80168,00000000,00000008,00000004,00000000,00000001,00000004,00000000,00000000,00000000), ref: 6C97E597
                                                                                    • GetTokenInformation.ADVAPI32(00000004,00000001(TokenIntegrityLevel),00000000,6CD80168,6CD80168,00000000,00000004,TokenIntegrityLevel,00000000,00000000,6CD80168,00000000,00000008,00000004,00000000,00000001), ref: 6C97E5BA
                                                                                    • GetLengthSid.ADVAPI32(00000000,00000004,TokenIntegrityLevel,00000000,6CD80168,6CD80168,00000000,00000004,TokenIntegrityLevel,00000000,00000000,6CD80168,00000000,00000008,00000004,00000000), ref: 6C97E5C6
                                                                                    • CopySid.ADVAPI32(?,00000000,00000000,00000000,00000004,TokenIntegrityLevel,00000000,6CD80168,6CD80168,00000000,00000004,TokenIntegrityLevel,00000000,00000000,6CD80168,00000000), ref: 6C97E5DF
                                                                                    • CloseHandle.KERNEL32(00000004,00000004,TokenIntegrityLevel,00000000,00000000,6CD80168,00000000,00000008,00000004,00000000,00000001,00000004,00000000,00000000,00000000), ref: 6C97E604
                                                                                    Strings
                                                                                    • GetVolumePathNamesForVolumeNameW, xrefs: 6C97E6EE
                                                                                    • GetNamedSecurityInfoW, xrefs: 6C97E511
                                                                                    • GetEffectiveRightsFromAclW, xrefs: 6C97E542
                                                                                    • BuildTrusteeWithSidW, xrefs: 6C97E530
                                                                                    • GetUserProfileDirectoryW, xrefs: 6C97E69A
                                                                                    • LookupAccountSidW, xrefs: 6C97E51E
                                                                                    • AllocateAndInitializeSid, xrefs: 6C97E609
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: Token$InformationProcess$CloseCopyCurrentHandleLengthOpen
                                                                                    • String ID: AllocateAndInitializeSid$BuildTrusteeWithSidW$GetEffectiveRightsFromAclW$GetNamedSecurityInfoW$GetUserProfileDirectoryW$GetVolumePathNamesForVolumeNameW$LookupAccountSidW
                                                                                    • API String ID: 822300113-2386193802
                                                                                    • Opcode ID: fb279e7fc72dae361bd1b1a7e8bcc92bd4a9041c747cbc003ea1d67c8a25fbed
                                                                                    • Instruction ID: 7ba919776214ebb3ae8a51e3001f3ae00aff16d8e85eeed784c237ba2ccb9b3e
                                                                                    • Opcode Fuzzy Hash: fb279e7fc72dae361bd1b1a7e8bcc92bd4a9041c747cbc003ea1d67c8a25fbed
                                                                                    • Instruction Fuzzy Hash: B371D472803248AEDF05DBE4CE989FD7B78AF15358F10015AE11173A90EB349A4DCB64

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 6C977613: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,6C9504FB,00000004), ref: 6C97761D
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C950561
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9505A4
                                                                                      • Part of subcall function 6C98B3E5: WaitForSingleObject.KERNEL32(?,00000000,00000004,6C9505EA,000000FF,00000000,00000000,00000004,?,?,?,?,?,?,?,6C950732), ref: 6C98B406
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C950637
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C95069B
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C9506BB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InfoObjectSingleSystemWait
                                                                                    • String ID:
                                                                                    • API String ID: 3021801052-0
                                                                                    • Opcode ID: f76c41796b7a6b0b11e941f8870cca06adc2ca22d5b603c515ef333db7904032
                                                                                    • Instruction ID: a4977ca27e1148dbb248ec74181bf0147dbee3da54d5c98cf505c764b75dec82
                                                                                    • Opcode Fuzzy Hash: f76c41796b7a6b0b11e941f8870cca06adc2ca22d5b603c515ef333db7904032
                                                                                    • Instruction Fuzzy Hash: 9F613CB1A002199FDB24CFA5D881AEEB7F9BF58318F10452EE515E7B80DB30E9458F50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 784 6c97d33f-6c97d37e CoCreateInstance 785 6c97d380-6c97d393 CoInitialize CoCreateInstance 784->785 786 6c97d398-6c97d39a 784->786 785->786 787 6c97d3a0-6c97d3b3 786->787 788 6c97d45b-6c97d461 786->788 792 6c97d452-6c97d457 787->792 793 6c97d3b9-6c97d3e5 call 6c980654 call 6c926006 787->793 789 6c97d463 CoUninitialize 788->789 790 6c97d468-6c97d46c 788->790 789->790 792->788 799 6c97d3e7-6c97d3ef call 6c92477c 793->799 800 6c97d3f0-6c97d3f2 793->800 799->800 802 6c97d3f4-6c97d414 800->802 803 6c97d449-6c97d44e 800->803 802->803 806 6c97d416-6c97d43e call 6c926b18 call 6c924781 802->806 803->792 806->803 811 6c97d440-6c97d448 call 6c92477c 806->811 811->803
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(6CDF05D0,00000000,00000001,6CDF0560,?,08000000,00000004,00000000), ref: 6C97D374
                                                                                    • CoInitialize.OLE32 ref: 6C97D385
                                                                                    • CoCreateInstance.OLE32(6CDF05D0,00000000,00000001,6CDF0560,?), ref: 6C97D393
                                                                                    • CoUninitialize.OLE32(6CDF0560,?,08000000,00000004,00000000), ref: 6C97D463
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance$InitializeUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 1701838895-0
                                                                                    • Opcode ID: d5a144eae8ba8102c3453d92f6c0dd6af90baaeeb18b00f8b0361d7ec913033c
                                                                                    • Instruction ID: 55f66f28f9870b1c53708af517e0cb06c5b67ea3b3aaa38a1ff1d1d4fc615b4b
                                                                                    • Opcode Fuzzy Hash: d5a144eae8ba8102c3453d92f6c0dd6af90baaeeb18b00f8b0361d7ec913033c
                                                                                    • Instruction Fuzzy Hash: 19418071901248AFDB00CBA8CC84EDEB7BCAF55318F004599F525E7BA0DB31A949CB60

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • __getptd.LIBCMT ref: 6CC2D8F1
                                                                                      • Part of subcall function 6CC26D22: __amsg_exit.LIBCMT ref: 6CC26D32
                                                                                    • __amsg_exit.LIBCMT ref: 6CC2D911
                                                                                    • InterlockedDecrement.KERNEL32(?), ref: 6CC2D93E
                                                                                    • InterlockedIncrement.KERNEL32(024E2808), ref: 6CC2D969
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
                                                                                    • String ID:
                                                                                    • API String ID: 2662827482-0
                                                                                    • Opcode ID: 281ac685035a7b14fad8f6f414480fc2e59289fd796718a248821925e583d2eb
                                                                                    • Instruction ID: 257b3c13179689352ee9f9ea3666b808d46b2a2539b2a46aa858a43b8cd1885f
                                                                                    • Opcode Fuzzy Hash: 281ac685035a7b14fad8f6f414480fc2e59289fd796718a248821925e583d2eb
                                                                                    • Instruction Fuzzy Hash: 90016D32E056159BCB21AF698445B9977B0BF16728F200146F814A7A80EF38AA45EBD1

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • ___sbh_find_block.LIBCMT ref: 6CC1E3E4
                                                                                    • ___sbh_free_block.LIBCMT ref: 6CC1E3F3
                                                                                    • HeapFree.KERNEL32(00000000,00000208,6CE84948,Function_004AE3BB,6CC1E083,00000208,6CE84908,Function_004AE055,6C950D5A,00000000,00000208,00000000,?,00000000,?,00000105), ref: 6CC1E423
                                                                                    • GetLastError.KERNEL32 ref: 6CC1E434
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast___sbh_find_block___sbh_free_block
                                                                                    • String ID:
                                                                                    • API String ID: 2661975262-0
                                                                                    • Opcode ID: 4b52a80e5c62c4f98c35a06934ce0096109b7cd4174a74b1efea2248a8f7f401
                                                                                    • Instruction ID: 46ea8f8601eda04a7e64af1efeaf23ab7c515f862d3ef3726bd4cf71db87015c
                                                                                    • Opcode Fuzzy Hash: 4b52a80e5c62c4f98c35a06934ce0096109b7cd4174a74b1efea2248a8f7f401
                                                                                    • Instruction Fuzzy Hash: 5B0167319092169ADF109BB3DC0D78D3774EF02729F54451DE414E6E80FB389544BB95

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • QStringCreate.WEBUI(?,?,?,6C771AD2,00000000,webkitcreate,?), ref: 6C7718F1
                                                                                    • QStringSet.WEBUI(00000000,?,?,?,?,6C771AD2,00000000,webkitcreate,?), ref: 6C7718FD
                                                                                      • Part of subcall function 6C771338: __EH_prolog3.LIBCMT ref: 6C77133F
                                                                                    • QStringCreate.WEBUI(00000000,?,?,?,?,6C771AD2,00000000,webkitcreate,?), ref: 6C771902
                                                                                    • QStringSet.WEBUI(00000000,00000000,00000000,?,?,?,?,6C771AD2,00000000,webkitcreate,?), ref: 6C77190C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$Create$H_prolog3
                                                                                    • String ID:
                                                                                    • API String ID: 3317808019-0
                                                                                    • Opcode ID: 41c36625daddd9fcc9ea73059fc412f6f277c4e1b5fc4c204e455b60cc4c75ab
                                                                                    • Instruction ID: 81a97c2dbdbc949f77488c97f9c4791a43706b905bcdba2c65836f2cef371229
                                                                                    • Opcode Fuzzy Hash: 41c36625daddd9fcc9ea73059fc412f6f277c4e1b5fc4c204e455b60cc4c75ab
                                                                                    • Instruction Fuzzy Hash: AFE0CD722002087BDF211BA04D9DFFF766CDFD5A59F000419F64466F408714CC196776

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 870 6c952942-6c952963 871 6c952965-6c952995 call 6c950cdd call 6c938f25 call 6c9381d7 call 6c775c8b 870->871 872 6c9529bc-6c9529d8 call 6c9528bf call 6c775c8b 870->872 896 6c952997-6c95299f call 6c92477c 871->896 897 6c9529a0-6c9529b1 call 6c938fbc 871->897 882 6c9529e3-6c9529e7 872->882 883 6c9529da-6c9529e2 call 6c92477c 872->883 886 6c952a4e-6c952a8f call 6c926b18 call 6c7873d6 882->886 887 6c9529e9-6c952a2d call 6cc22520 call 6c926b18 call 6c9294ab call 6c83aff4 882->887 883->882 904 6c952a91-6c952a99 call 6c92477c 886->904 905 6c952a9a-6c952aa3 886->905 925 6c952a2f-6c952a35 call 6c774e9d 887->925 926 6c952a3a-6c952a43 887->926 896->897 897->872 908 6c9529b3-6c9529bb call 6c92477c 897->908 904->905 911 6c952aa5-6c952aad call 6c92477c 905->911 912 6c952aae-6c952abb 905->912 908->872 911->912 917 6c952abd-6c952ae5 call 6c924ab2 912->917 918 6c952b3b-6c952b44 912->918 935 6c952ae7-6c952af3 call 6c92586e 917->935 936 6c952af8-6c952b1c call 6c925776 call 6c926006 LoadLibraryW 917->936 922 6c952b46-6c952b4e call 6c92477c 918->922 923 6c952b4f-6c952b56 918->923 922->923 929 6c952b63 923->929 930 6c952b58-6c952b5e call 6c774e9d 923->930 925->926 926->886 933 6c952a45-6c952a4d call 6c92477c 926->933 931 6c952b65-6c952b69 929->931 930->929 933->886 935->936 945 6c952b1e-6c952b22 936->945 946 6c952b6a-6c952b6e 936->946 949 6c952b24-6c952b2c call 6c92477c 945->949 950 6c952b2d-6c952b39 945->950 947 6c952b70-6c952b78 call 6c92477c 946->947 948 6c952b79-6c952b82 946->948 947->948 953 6c952b84-6c952b8c call 6c92477c 948->953 954 6c952b8d-6c952b94 948->954 949->950 950->917 950->918 953->954 958 6c952b96-6c952b9c call 6c774e9d 954->958 959 6c952ba1-6c952ba4 954->959 958->959 959->931
                                                                                    APIs
                                                                                    • _getenv.LIBCMT ref: 6C9529EF
                                                                                      • Part of subcall function 6C950CDD: GetModuleFileNameW.KERNEL32(00000000,?,00000105), ref: 6C950CF6
                                                                                    • LoadLibraryW.KERNEL32(00000000,6C96DAFC,?,00000001,00000000,00000000,?,00000000), ref: 6C952B0D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileLibraryLoadModuleName_getenv
                                                                                    • String ID: PATH
                                                                                    • API String ID: 44517052-1036084923
                                                                                    • Opcode ID: 0b07390100a701bb1647b711e2e62c654cac7be9b76be61029c3fb58b75ab05a
                                                                                    • Instruction ID: 2fd1bcd28bf43ba3c9f93ada4f9b705e5c7a608dd50adab6e7ee4cd31f799e01
                                                                                    • Opcode Fuzzy Hash: 0b07390100a701bb1647b711e2e62c654cac7be9b76be61029c3fb58b75ab05a
                                                                                    • Instruction Fuzzy Hash: 17819F71900109AFCF05CF98D994DEEB7B8AF25329F550069E416A77A0DB34DE58CFA0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 962 6c96db4e-6c96db5f call 6c96daab 965 6c96db61-6c96db68 962->965 966 6c96db6a-6c96db75 QueryPerformanceCounter 962->966 965->966 967 6c96db90-6c96db97 965->967 968 6c96db77-6c96db7e 966->968 969 6c96db7f-6c96db8f call 6c941677 966->969 970 6c96db9d-6c96dbaa GetTickCount 967->970 971 6c96db99-6c96db9c 967->971 974 6c96dbb2-6c96dbc9 970->974 975 6c96dbac 970->975 975->974
                                                                                    APIs
                                                                                      • Part of subcall function 6C96DAAB: QueryPerformanceFrequency.KERNEL32(6C96DBD2,GetTickCount64,00000001,00000004,6C950516,?,?,?,6C96DBD2,00000004), ref: 6C96DB16
                                                                                    • QueryPerformanceCounter.KERNEL32(6C950516,?,?,?,6C96DBD2,00000004,6C950516,00000004,?,?,?,?,?,?,?,6C950732), ref: 6C96DB6E
                                                                                    Strings
                                                                                    • QueryPerformanceCounter failed, although QueryPerformanceFrequency succeeded., xrefs: 6C96DB7F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.2702449853.000000006C771000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C770000, based on PE: true
                                                                                    • Associated: 00000002.00000002.2702390667.000000006C770000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CCC7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CDB8000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2706010171.000000006CE07000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707247108.000000006CE88000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707284677.000000006CE8D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707310668.000000006CE8F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707355574.000000006CE9A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707389691.000000006CE9C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707467551.000000006CEB2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707513049.000000006CEB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.2707538818.000000006CEBA000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_6c770000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: PerformanceQuery$CounterFrequency
                                                                                    • String ID: QueryPerformanceCounter failed, although QueryPerformanceFrequency succeeded.
                                                                                    • API String ID: 774501991-4065940233
                                                                                    • Opcode ID: 96b0fab153d13e8d256e2f914cf95b2b44eae1f113f7a27eb3884d8bb3611d0b
                                                                                    • Instruction ID: 5b4676cbdedf423cd92504795e770d02bffcf3446482384a2d8bb41ad7af317c
                                                                                    • Opcode Fuzzy Hash: 96b0fab153d13e8d256e2f914cf95b2b44eae1f113f7a27eb3884d8bb3611d0b
                                                                                    • Instruction Fuzzy Hash: DF01A433705145ABFF04DBB2D940A6A33BDAB8724CF308559C815D6FC8EBB0D5448B54

                                                                                    Execution Graph

                                                                                    Execution Coverage:2%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:22
                                                                                    Total number of Limit Nodes:0

                                                                                    Callgraph

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 6C12692C
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C126941
                                                                                    • UnhandledExceptionFilter.KERNEL32(6C2F08B4), ref: 6C12694C
                                                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 6C126968
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 6C12696F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2765253542.000000006C0C6000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BC70000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2765232826.000000006BC70000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BC71000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BCB3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BCD2000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BD09000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BD2F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BD64000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BD87000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BDA8000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BDD7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BE30000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BE7A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BEA0000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BEA6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BEA8000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BEAE000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BED7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BEFB000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF00000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF08000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF0A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF0D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF19000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF1C000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF1E000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF5D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BF7F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BFDD000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BFEF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BFF9000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006BFFF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C018000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C021000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C024000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C05A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C066000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C08E000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C093000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C095000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C145000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C147000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C14F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2765253542.000000006C15B000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C1C9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C1D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C1EC000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C223000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C227000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C268000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C26F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C272000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C27F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C287000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C2B8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C2C4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C2FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C2FD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C30A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C317000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2771280269.000000006C326000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2772938017.000000006C388000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2772987378.000000006C38D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773030675.000000006C38F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773093774.000000006C39A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773134800.000000006C39C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773262101.000000006C3B2000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773326240.000000006C3B7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2773437610.000000006C3BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_6bc70000_iScrPaint.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 2579439406-0
                                                                                    • Opcode ID: 3c0e3ca484a3955501b80fc4e73916e2fd32bd651e3184e344e95854ab9584ab
                                                                                    • Instruction ID: fbf1b234037a31f822e4332a9400bfd321a41c96ed9cf9fd5cd88ce191c2b6f4
                                                                                    • Opcode Fuzzy Hash: 3c0e3ca484a3955501b80fc4e73916e2fd32bd651e3184e344e95854ab9584ab
                                                                                    • Instruction Fuzzy Hash: EB21AEB8B152089FDF41DF65C484A447BB8FB2B314F10545AE409DBB90E7B89A81CFA9

                                                                                    Execution Graph

                                                                                    Execution Coverage:6.1%
                                                                                    Dynamic/Decrypted Code Coverage:34.8%
                                                                                    Signature Coverage:2.8%
                                                                                    Total number of Nodes:287
                                                                                    Total number of Limit Nodes:3
                                                                                    execution_graph 21103 140018fe4 44 API calls _RunAllParam 21245 14001bae4 39 API calls 21104 1400143e8 204 API calls 21159 1400200ec 39 API calls 21246 14001c2ec 163 API calls 21161 1400190ef InitializeCriticalSection 21200 1400075f0 FindClose 21201 1400259f8 34 API calls 2 library calls 21202 14000f9f9 53 API calls 2 library calls 21105 14000bffc 130 API calls 2 library calls 21162 1400018fc 49 API calls 21106 14001d000 73 API calls _cwprintf_s_l 21163 14001e504 RedrawWindow 21107 140026008 35 API calls 21204 14002420c 127 API calls 21205 7ff67ec53233 11 API calls 21040 14011bc1c 21041 14011bc21 _RunAllParam 21040->21041 21050 14011e988 21041->21050 21043 14011bc2e _RunAllParam 21064 1401232a8 21043->21064 21045 14011bd5a _RunAllParam 21068 140120b68 21045->21068 21047 14011be2e _RunAllParam 21048 14011be07 _RunAllParam 21048->21047 21049 7ff67ec51157 29 API calls 21048->21049 21049->21047 21051 14011e9c4 _RunAllParam 21050->21051 21071 140120018 21051->21071 21053 14011f0c6 _RunAllParam 21075 14011dea8 21053->21075 21055 14011f23a 21056 140120018 _RunAllParam LoadLibraryExW 21055->21056 21057 14011f2b7 _RunAllParam 21056->21057 21079 14011ff38 CreateFileW 21057->21079 21059 14011f580 21088 14011fe28 CreateFileW 21059->21088 21061 14011f385 _RunAllParam 21061->21059 21085 14011f888 21061->21085 21063 14011f59a _RunAllParam 21063->21043 21065 1401232c3 _RunAllParam 21064->21065 21067 140123337 _RunAllParam 21065->21067 21092 14011d758 CreateFileW 21065->21092 21067->21045 21097 1401209f8 21068->21097 21070 140120b85 21070->21048 21072 14012003b _RunAllParam 21071->21072 21073 14012006a LoadLibraryExW 21072->21073 21074 140120048 21072->21074 21073->21074 21074->21053 21076 14011decf _RunAllParam 21075->21076 21077 140120018 _RunAllParam LoadLibraryExW 21076->21077 21078 14011dfa6 _RunAllParam 21077->21078 21078->21055 21080 14011ff8c malloc 21079->21080 21082 14011ff87 21079->21082 21080->21082 21083 14011ffc5 ReadFile 21080->21083 21082->21061 21083->21082 21084 14011ffff NtClose 21083->21084 21084->21082 21086 14011f8d3 realloc 21085->21086 21087 14011f8a3 21085->21087 21086->21087 21087->21059 21089 14011fe8b _RunAllParam 21088->21089 21090 14011fea6 CreateFileMappingW MapViewOfFile 21089->21090 21091 14011feff 21090->21091 21091->21063 21093 14011d7b8 21092->21093 21095 14011d7b1 21092->21095 21094 14011d7f1 GlobalAlloc ReadFile 21093->21094 21093->21095 21094->21095 21096 14011d847 CloseHandle 21094->21096 21095->21067 21096->21095 21101 14011c578 21097->21101 21100 140120a57 _RunAllParam 21100->21070 21102 14011c5a2 VirtualAlloc 21101->21102 21102->21100 21109 14001c80c 72 API calls 2 library calls 21166 140015d0c SetCapture ReleaseCapture 21167 140017914 34 API calls 21208 140019e14 36 API calls 21248 14001cf14 130 API calls _RunAllParam 21209 140001614 43 API calls _RunAllParam 21112 140025018 339 API calls 21249 140020f18 33 API calls 2 library calls 21250 140015f18 InvalidateRect 21210 14000861a 56 API calls 21251 140016b1c FindWindowExW EnumChildWindows #6 #2 _cwprintf_s_l 21113 7ff67ec5501f 12 API calls 21114 140022420 SendMessageW lstrlenW PostMessageW 21115 140002020 #6 21252 14001f724 50 API calls _cwprintf_s_l 21116 14000b824 73 API calls 2 library calls 21117 140001424 47 API calls _cwprintf_s_l 21118 140025c28 30 API calls 21212 140020228 SendMessageW SendMessageW 21168 140005d28 61 API calls 2 library calls 21120 14001442c 244 API calls 21213 14001a22c 46 API calls _RunAllParam 21121 1400c8028 lstrlenW lstrcatW lstrlenW _cwprintf_s_l 21122 140015c2d 6 API calls 21253 140015f30 InvalidateRgn 21169 14011a924 RegOpenKeyW lstrlenW RegSetValueExW RegCloseKey 21170 140008134 ReleaseDC DeleteDC 21171 140006138 55 API calls 2 library calls 21215 140001638 SetBkColor SetTextColor CreateSolidBrush GetWindowLongPtrW CallWindowProcW 21172 14000cd3c 86 API calls _RunAllParam 21217 140019240 65 API calls 21255 140002f40 44 API calls _RunAllParam 21173 140025944 484 API calls 21256 140019f44 39 API calls 21123 14000a844 67 API calls _cwprintf_s_l 21174 1400aa950 34 API calls 21175 140008546 20 API calls 20895 140014548 20896 140014551 20895->20896 20897 140014556 20895->20897 20899 140014528 20896->20899 20900 140014531 20899->20900 20903 14001448c 20900->20903 20904 1400144aa 20903->20904 20905 1400144f3 OutputDebugStringA 20904->20905 20909 14011d934 GetComputerNameW 20904->20909 20911 14011be80 20905->20911 20908 14001451a Sleep 20908->20900 20910 14011d950 _RunAllParam 20909->20910 20910->20904 20912 14011be87 _RunAllParam 20911->20912 20913 14011bf59 _RunAllParam 20912->20913 20915 7ff67ec51157 20912->20915 20913->20908 20918 7ff67ec511b5 20915->20918 20919 7ff67ec511ec 20918->20919 20920 7ff67ec5125c 20919->20920 20921 7ff67ec51252 exit 20919->20921 20926 7ff67eeadf11 20920->20926 20921->20920 20923 7ff67ec512e5 20932 7ff67eead6d0 20923->20932 20927 7ff67eeadf27 20926->20927 20931 7ff67eeadfad 20926->20931 20936 7ff67eeadbeb 20927->20936 20931->20923 20933 7ff67eead6e8 20932->20933 20955 7ff67eead699 20933->20955 20937 7ff67eeadc1e 20936->20937 20938 7ff67eeadcb3 20936->20938 20939 7ff67eeadc5f 20937->20939 20942 7ff67eeadcb8 20937->20942 20943 7ff67eeadacc 20938->20943 20939->20938 20947 7ff67eeadba4 20939->20947 20941 7ff67eeadba4 VirtualProtect 20941->20942 20942->20938 20942->20941 20944 7ff67eeadae0 20943->20944 20945 7ff67eeadb9c 20944->20945 20946 7ff67eeadb08 VirtualProtect 20944->20946 20945->20931 20946->20944 20948 7ff67eeadbbf 20947->20948 20950 7ff67eeadbcb 20947->20950 20951 7ff67eead850 20948->20951 20950->20939 20953 7ff67eead868 20951->20953 20952 7ff67eeadaae 20952->20950 20953->20952 20954 7ff67eeada22 VirtualProtect 20953->20954 20954->20952 20958 7ff67eead686 20955->20958 20961 7ff67eeac524 20958->20961 21031 7ff67ec53281 GetProcAddress GetProcAddress 20961->21031 20965 7ff67eeac52d 21032 7ff67ec536a0 GetProcAddress GetProcAddress 20965->21032 21033 7ff67ec553a5 GetProcAddress GetProcAddress 20965->21033 21034 7ff67ec7d2da GetProcAddress GetProcAddress ExitProcess 20965->21034 20983 7ff67eeac4d0 20983->20961 20986 7ff67ecaad94 20983->20986 20991 7ff67ed94300 20983->20991 20997 7ff67edafb9a 20983->20997 21001 7ff67ecf0674 20983->21001 21017 7ff67ecf0798 20983->21017 21023 7ff67ecadbe0 16 API calls 20983->21023 21024 7ff67ecb3c60 13 API calls 20983->21024 21025 7ff67eced340 15 API calls 20983->21025 21026 7ff67ecf6450 12 API calls 20983->21026 21027 7ff67ed23d85 14 API calls 20983->21027 21028 7ff67ed7cd60 12 API calls 20983->21028 21029 7ff67eded5fa 13 API calls 20983->21029 21030 7ff67ee05ede 12 API calls 20983->21030 21035 7ff67ecf05ec GetProcAddress GetProcAddress 20983->21035 21036 7ff67ed07e74 GetProcAddress GetProcAddress 20983->21036 21037 7ff67ed92c78 GetProcAddress GetProcAddress 20983->21037 21038 7ff67ee9c680 13 API calls 20983->21038 21039 7ff67ee9ecac GetProcAddress GetProcAddress 20983->21039 20987 7ff67ec5f250 12 API calls 20986->20987 20988 7ff67ecaadb9 20987->20988 20989 7ff67ec7cb51 12 API calls 20988->20989 20990 7ff67ecaadd6 20989->20990 20990->20983 20992 7ff67ed94309 20991->20992 20994 7ff67ed945b3 20992->20994 20995 7ff67ed9449a 20992->20995 20996 7ff67ed93fa0 15 API calls 20992->20996 20993 7ff67ec7cb51 12 API calls 20993->20994 20994->20983 20995->20993 20995->20994 20996->20995 20998 7ff67edafba3 20997->20998 20999 7ff67edae1e0 13 API calls 20998->20999 21000 7ff67edafba8 20999->21000 21002 7ff67ecf069a 21001->21002 21003 7ff67ec60fe0 GetProcAddress GetProcAddress 21002->21003 21004 7ff67ecf06ef 21003->21004 21005 7ff67ec60fe0 GetProcAddress GetProcAddress 21004->21005 21006 7ff67ecf0709 21005->21006 21007 7ff67ec60fe0 GetProcAddress GetProcAddress 21006->21007 21008 7ff67ecf0723 21007->21008 21009 7ff67ec60fe0 GetProcAddress GetProcAddress 21008->21009 21010 7ff67ecf073d 21009->21010 21011 7ff67ec60fe0 GetProcAddress GetProcAddress 21010->21011 21012 7ff67ecf0757 21011->21012 21013 7ff67ec60fe0 GetProcAddress GetProcAddress 21012->21013 21014 7ff67ecf0771 21013->21014 21015 7ff67ec60fe0 GetProcAddress GetProcAddress 21014->21015 21016 7ff67ecf078b 21015->21016 21016->20983 21018 7ff67ecf07be 21017->21018 21019 7ff67ec60fe0 GetProcAddress GetProcAddress 21018->21019 21020 7ff67ecf0813 21019->21020 21021 7ff67ec60fe0 GetProcAddress GetProcAddress 21020->21021 21022 7ff67ecf082d 21021->21022 21022->20983 21023->20983 21024->20983 21025->20983 21026->20983 21027->20983 21028->20983 21029->20983 21031->20965 21032->20965 21033->20965 21034->20983 21035->20983 21036->20983 21037->20983 21038->20983 21039->20983 21176 14001554c InterlockedPushEntrySList _RunAllParam 21258 140013f50 105 API calls _RunAllParam 21126 140005450 62 API calls 2 library calls 21220 1400ab254 31 API calls 2 library calls 21128 140016c5c OleLockRunning 21223 140008a5c DeleteObject DestroyCursor InterlockedPushEntrySList _RunAllParam 21179 14005c55c GetModuleHandleW GetProcAddress GetCurrentProcess 21130 140007860 56 API calls _RunAllParam 21224 140001260 45 API calls _cwprintf_s_l 21180 140016964 41 API calls _cwprintf_s_l 21131 140007c64 35 API calls 2 library calls 21181 14000f565 29 API calls 2 library calls 21132 140007468 RegCloseKey 21183 140015d6c 9 API calls 21226 140002a6c LoadLibraryW GetProcAddress 21227 14000a26c 46 API calls _RunAllParam 21133 140026470 73 API calls 2 library calls 21134 140016470 #6 #7 #6 21135 140022074 42 API calls 2 library calls 21228 140007274 37 API calls 21259 140017b78 9 API calls _cwprintf_s_l 21229 140002278 GlobalUnlock GlobalFree 21260 140007778 DeleteDC 21185 140001d7c FindWindowExW EnumChildWindows 21186 14010656c lstrlenA MultiByteToWideChar lstrlenW 21261 14000277c LeaveCriticalSection 21187 14000a180 EndPaint 21231 14000ae80 146 API calls 21137 7ff67ec513a7 12 API calls 21188 14001d988 SendMessageW SendMessageW 21232 140015e88 GetClientRect BitBlt DeleteDC ReleaseDC 21138 140002488 KillTimer SetTimer 21189 140001988 41 API calls 21139 14001048c 64 API calls 2 library calls 21234 14010ae9c 42 API calls _cwprintf_s_l 21235 140016290 45 API calls _RunAllParam 21263 140019790 27 API calls 21264 14001e790 KillTimer SetTimer GetWindowLongPtrW DefWindowProcW 21143 140007490 DestroyMenu 21265 140001390 lstrcpynW 21144 14001e494 GetWindowRect GetWindowRect SetWindowPos 21191 140015594 SetWindowLongPtrW DestroyWindow SetLastError 21266 140006794 74 API calls _RunAllParam 21267 7ff67ec53a99 12 API calls 21192 14001f99c 8 API calls 21193 140016d9c CallWindowProcW 21145 14001c4a0 64 API calls 2 library calls 21194 1400179a0 #7 lstrlenW CoTaskMemAlloc lstrlenW 21268 1400143a0 155 API calls 21146 14001c0a4 22 API calls 21147 1400200a8 44 API calls 21269 140019fa8 40 API calls 21148 7ff67ec54b52 TlsSetValue 21270 14001a7ac 46 API calls _RunAllParam 21195 1400089ac 9 API calls 21149 1400250b0 170 API calls _RunAllParam 21150 1400238b0 90 API calls 21236 140002ab0 FindWindowExW GetFocus 21152 1400170bd EnterCriticalSection LeaveCriticalSection 21197 1400069c0 129 API calls 21271 140002bc0 31 API calls 2 library calls 21240 140034ec4 44 API calls _cwprintf_s_l 21153 7ff67ec5bb6c 12 API calls 21198 14001e5c8 DeleteObject 21272 1400147c8 44 API calls 2 library calls 21241 1400256d0 728 API calls 21155 1400198d0 85 API calls _cwprintf_s_l 21273 140016bd0 GetDC ReleaseDC 21274 140019fd0 37 API calls 21156 1400010d0 LoadLibraryW GetProcAddress 20880 7ff67ecadd60 20881 7ff67ecaded1 20880->20881 20882 7ff67ecadde1 20880->20882 20887 7ff67ec620a2 20881->20887 20891 7ff67ec62078 20887->20891 20894 7ff67ec615e0 13 API calls 20891->20894 20893 7ff67ec6208f 20894->20893 21157 1400224d4 79 API calls 21242 140024ed4 238 API calls 21275 140015bd4 #2 21199 14000b1dc lstrlenA MultiByteToWideChar lstrlenW lstrlenW _RunAllParam 21278 140006fdc GetWindowLongW SetWindowLongW SetWindowPos 21279 1400023e0 SetWindowPos GetClientRect SetTimer

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 11 14011ff38-14011ff85 CreateFileW 12 14011ff87 11->12 13 14011ff8c-14011ffc1 malloc 11->13 14 14012000f-140120013 12->14 16 14011ffc3 13->16 17 14011ffc5-14011fffb ReadFile 13->17 16->14 18 14011ffff-140120009 NtClose 17->18 19 14011fffd 17->19 18->14 19->14
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFilemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 3010914732-0
                                                                                    • Opcode ID: 08291fb8f84a33b773d04131f42d1229c88b2589c06dea98ea13bb42374a242d
                                                                                    • Instruction ID: 2d00926db45b5a94333cbffaf12b2d1fc501933b49b87ad3f4aa4d041c57759c
                                                                                    • Opcode Fuzzy Hash: 08291fb8f84a33b773d04131f42d1229c88b2589c06dea98ea13bb42374a242d
                                                                                    • Instruction Fuzzy Hash: F921C536218B8482D761DF16E44475EBBB1F3C9B94F204219EB9D47BA8DF7AD4449B00

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: exit
                                                                                    • String ID: 0
                                                                                    • API String ID: 2483651598-4108050209
                                                                                    • Opcode ID: 47e819206137d4ac6da146edce70c4bdf60c26c5c5ff5ac6bc07e642c1bb8936
                                                                                    • Instruction ID: 2422e7d3a050729c6e1325b92cd86316ff6224cca000b40a1c792cca32cb44a5
                                                                                    • Opcode Fuzzy Hash: 47e819206137d4ac6da146edce70c4bdf60c26c5c5ff5ac6bc07e642c1bb8936
                                                                                    • Instruction Fuzzy Hash: 7241C67AB24B1689FB008B95E88436837B0BB94B98F504835EE1DD77A4CFBCD8448740

                                                                                    Control-flow Graph

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: pqC=
                                                                                    • API String ID: 0-2624859440
                                                                                    • Opcode ID: 1a67f2e54d72da71d6003820c9f4e5abcec1c6741b6053d53ce0b2fb158ffd53
                                                                                    • Instruction ID: 92efe3665d8568ff8609e6be986c692dbd9abb2acd7015b9add6df38bd0a9f85
                                                                                    • Opcode Fuzzy Hash: 1a67f2e54d72da71d6003820c9f4e5abcec1c6741b6053d53ce0b2fb158ffd53
                                                                                    • Instruction Fuzzy Hash: 78810977F2464189FB08CBB598526BD27B1A7A47A4F20463AEE3ED77D4CE2CD1918700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: malloc
                                                                                    • String ID:
                                                                                    • API String ID: 2803490479-0
                                                                                    • Opcode ID: b8b41f4fd6ca89d32c12c971d407b76c3aa693578191e34d7ff83a2474acf318
                                                                                    • Instruction ID: 916821de92ac54db2f24456a3d1b468db46d670b977ad675d4bea8f240fb5a01
                                                                                    • Opcode Fuzzy Hash: b8b41f4fd6ca89d32c12c971d407b76c3aa693578191e34d7ff83a2474acf318
                                                                                    • Instruction Fuzzy Hash: 298127E7B28B4542EC04C6F768717B66662AB66BF0E209735FE3E9B3D9CE1C91014600

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140123371), ref: 000000014011D7A1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: fa702a1818ffb6b8e9e1b8e5fb94fe68093c190d33758d34eb9046929484e72f
                                                                                    • Instruction ID: a872d6ac15e49e81bcb6e402cc2fdf8fedc509efffe6e503cca0c791e6531545
                                                                                    • Opcode Fuzzy Hash: fa702a1818ffb6b8e9e1b8e5fb94fe68093c190d33758d34eb9046929484e72f
                                                                                    • Instruction Fuzzy Hash: B3319336608B4487EB60CF2AE49435EBBB4F7C9B94F604115EB9947BA8DF39C5458F00

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Create$MappingView
                                                                                    • String ID:
                                                                                    • API String ID: 1299149932-0
                                                                                    • Opcode ID: adc7ce85746f15b18e302e3d6d9fbbf35a76bdbe9ac71d6ff60923e7ba8727e8
                                                                                    • Instruction ID: 820315da7b4020408db1b1cc614476c0a1407536e4ab1f95ad091a2a37da56bc
                                                                                    • Opcode Fuzzy Hash: adc7ce85746f15b18e302e3d6d9fbbf35a76bdbe9ac71d6ff60923e7ba8727e8
                                                                                    • Instruction Fuzzy Hash: 1621A376218B8082EBA0DB56F45575EBBA0F3C9B84F209115EBCD87B68DF7DC4598B00

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProtectVirtual
                                                                                    • String ID: @
                                                                                    • API String ID: 544645111-2766056989
                                                                                    • Opcode ID: 1ee2fb690ed4846a8645586928a4fbdb26446c2100cce16632af6ccc271c9d34
                                                                                    • Instruction ID: e1c751916c0ad6935b42b991e861dec1bee79d2819ee9a60d193d924cc249960
                                                                                    • Opcode Fuzzy Hash: 1ee2fb690ed4846a8645586928a4fbdb26446c2100cce16632af6ccc271c9d34
                                                                                    • Instruction Fuzzy Hash: 7D6126A3F157498BEB54CB55D5852A833B1FB68B88B148835EA1DC7714EF3CEA45D300

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocCreateThreadVirtual
                                                                                    • String ID: %[<
                                                                                    • API String ID: 3065189322-2541391821
                                                                                    • Opcode ID: 21758bb11c112705ee1ec073bcbb7c9faf1ce1bfa67398d85c94dd84d3e4a1a2
                                                                                    • Instruction ID: d2f0bbf958ba2b391c189b5c78c3331b41c904eec8f029f37617c37de103aba9
                                                                                    • Opcode Fuzzy Hash: 21758bb11c112705ee1ec073bcbb7c9faf1ce1bfa67398d85c94dd84d3e4a1a2
                                                                                    • Instruction Fuzzy Hash: 6541C037A28B4186D748CF28E84026A77B1FBA5744F60463AFA8ECB764DF7CD4498740

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 428 14011d934-14011d94b GetComputerNameW call 14011c948 430 14011d950-14011d9b0 call 14011d2a8 428->430 435 14011d9bc-14011d9c5 430->435 436 14011d9c7-14011d9d7 435->436 437 14011d9d9-14011d9e1 435->437 436->435 439 14011d9ed-14011d9f5 437->439 440 14011d9f7-14011da28 439->440 441 14011da2a-14011da43 439->441 440->439
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID:
                                                                                    • API String ID: 3545744682-0
                                                                                    • Opcode ID: 8aa76fb0e6ea81a43412a6e4ce3e67ee4a0c44f8450056c290c247b20c5f490d
                                                                                    • Instruction ID: 3d613ac56ecaa76a4e7d91ee78244c06fa0071a276e7ba6f2ac5590dae2c62da
                                                                                    • Opcode Fuzzy Hash: 8aa76fb0e6ea81a43412a6e4ce3e67ee4a0c44f8450056c290c247b20c5f490d
                                                                                    • Instruction Fuzzy Hash: 3931B272218A848AC774CB29E48075EB7A1F7CCB58F444216E6CE87B69DA3CCA45CF04

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 444 7ff67eeadacc-7ff67eeadadb 445 7ff67eeadb8d-7ff67eeadb96 444->445 446 7ff67eeadae0-7ff67eeadb02 445->446 447 7ff67eeadb9c-7ff67eeadba3 445->447 448 7ff67eeadb88 446->448 449 7ff67eeadb08-7ff67eeadb86 VirtualProtect 446->449 450 7ff67eeadb89 448->450 449->450 450->445
                                                                                    APIs
                                                                                    • VirtualProtect.KERNELBASE(?,?,?,?,?,00007FF67EEADFAD,?,?,?,?,?,00007FF67EC512E5), ref: 00007FF67EEADB84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 544645111-0
                                                                                    • Opcode ID: 131621e4005552d7fd18f5b1666d2410f6c071a6ab3073cbc9e42cd67da8f2f7
                                                                                    • Instruction ID: 6697c2d00150f2f33c05fd96dae5cc26bc89f6848d6fa9dfb25fa428989d8208
                                                                                    • Opcode Fuzzy Hash: 131621e4005552d7fd18f5b1666d2410f6c071a6ab3073cbc9e42cd67da8f2f7
                                                                                    • Instruction Fuzzy Hash: DC113DA3F1534A8BEF04CB65E58627863A1ABA8BC5B158435EE1DC7714EE2CEB059700

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocCreateThreadVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3065189322-0
                                                                                    • Opcode ID: 6a058c7e5b27de97289d6ee5a90bff0a7e69e95256b4b8ade4ef7c58a6fcd866
                                                                                    • Instruction ID: 81283adeb7ab29316cac5299403e6e0e046d7e3c6b89e0b0195cd7bd8c8f306f
                                                                                    • Opcode Fuzzy Hash: 6a058c7e5b27de97289d6ee5a90bff0a7e69e95256b4b8ade4ef7c58a6fcd866
                                                                                    • Instruction Fuzzy Hash: 6C212A36629B4586D7408B58E8403A977B4FB98B48F604635FA8E87764DF7CC15AC740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: realloc
                                                                                    • String ID:
                                                                                    • API String ID: 471065373-0
                                                                                    • Opcode ID: 3f1eb1290eb503b2145d9c0e382a8b9ab882b585fb38e67f0ecac83848e7f568
                                                                                    • Instruction ID: 561e48d5a86c5783f5dc688081665245eb1983b796079a5d4baa60a9d0ab499f
                                                                                    • Opcode Fuzzy Hash: 3f1eb1290eb503b2145d9c0e382a8b9ab882b585fb38e67f0ecac83848e7f568
                                                                                    • Instruction Fuzzy Hash: 84119736604B4886DA44DB0AE48025E77B4F3D9B80F614026EF8D57B68DF3AC946DB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 1029625771-0
                                                                                    • Opcode ID: 5fdda1b636b50f9fc504353daad9641b4c9c534a50ade388255728a4b60dc926
                                                                                    • Instruction ID: d573d171b4691707fc38c9ddb05e420b9f30bf651de66fe43147e61a49fc26ed
                                                                                    • Opcode Fuzzy Hash: 5fdda1b636b50f9fc504353daad9641b4c9c534a50ade388255728a4b60dc926
                                                                                    • Instruction Fuzzy Hash: AF01D672218B88C2E6219B16E45436EB7B0F3CDB88F504625EBCD47B69CF3DC9448B04
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: realloc
                                                                                    • String ID:
                                                                                    • API String ID: 471065373-0
                                                                                    • Opcode ID: 8987f05d07c6f91804d3ea28e0450f3a33fec2cb30592d01f9fe987dc296c81a
                                                                                    • Instruction ID: c43acd54e646aed246190f344c2b995fff6746ce9e0a622b4d2d5316f94c3a7d
                                                                                    • Opcode Fuzzy Hash: 8987f05d07c6f91804d3ea28e0450f3a33fec2cb30592d01f9fe987dc296c81a
                                                                                    • Instruction Fuzzy Hash: 54F0807A52CB8581DA50DB45F48046EB7B4FBE9BD0F601425FA8E87B29CF7CD0948B40
                                                                                    APIs
                                                                                    • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00007FF67ED93FBC), ref: 00007FF67ED92D75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoSystem
                                                                                    • String ID:
                                                                                    • API String ID: 31276548-0
                                                                                    • Opcode ID: 759ac02cd1155738cbb2816376f03f5343e83c8cfe163886f608533154076069
                                                                                    • Instruction ID: 28fd32f6bafbadcd69a0622a5f9bedb7bb92ffd82969621a0606cd72da971be8
                                                                                    • Opcode Fuzzy Hash: 759ac02cd1155738cbb2816376f03f5343e83c8cfe163886f608533154076069
                                                                                    • Instruction Fuzzy Hash: 6BF06237B3EB4582DA90C705F49116AB7A0F798784F405531FA8F83764EE6CD0448B40
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,0000000140120B85), ref: 0000000140120A36
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 6bcd8b487a366c1c59843c47b777b3e1da3161276deb4923ee1d31ae147b4254
                                                                                    • Instruction ID: 666a9bba36a8258ab6c1abd1cc1a10056bbc9ec2a7f906673a408a3f03c71112
                                                                                    • Opcode Fuzzy Hash: 6bcd8b487a366c1c59843c47b777b3e1da3161276deb4923ee1d31ae147b4254
                                                                                    • Instruction Fuzzy Hash: A541B776219B8486DB61CF0AE08075EBBA0F388F94F405156EB8E97B69DB79C545CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3108844767.00007FF67EC51000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67EC50000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3108809846.00007FF67EC50000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109060685.00007FF67EEAF000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109095782.00007FF67EEC0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EED8000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EEDC000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109124713.00007FF67EF3E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109216692.00007FF67EF42000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3109242748.00007FF67EF44000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_7ff67ec50000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: aa109c9e8b356161c3d06490bd9e554d9ed1f16f4d6a7cbfcb837ab162aa4fd9
                                                                                    • Instruction ID: 846e3d957378f9cd08252d00d0a76ef6162a60b2d65a81069600ba2a716c9229
                                                                                    • Opcode Fuzzy Hash: aa109c9e8b356161c3d06490bd9e554d9ed1f16f4d6a7cbfcb837ab162aa4fd9
                                                                                    • Instruction Fuzzy Hash: 90012837729B8586DB60CB55F45022AA7E0FB89B84F200534FA8ECBB58EE3DC1508B00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$Item$EnableSystem$LongMetrics$ClientImageLoadParentRectScreenTextlstrlen$ByteCharInfoMultiParametersWide
                                                                                    • String ID: LZDE$LZEN$LZIT$Lizenz$lng
                                                                                    • API String ID: 2727863672-2363247610
                                                                                    • Opcode ID: 174c2ef5cb3542c4634db0dd5a4240508240e34c614a04612fcd01b8688baa98
                                                                                    • Instruction ID: 9f9485a48d6402ffa7bcfd86dcc73b779697d7fdc7c33d9dfa55754880688632
                                                                                    • Opcode Fuzzy Hash: 174c2ef5cb3542c4634db0dd5a4240508240e34c614a04612fcd01b8688baa98
                                                                                    • Instruction Fuzzy Hash: 93F15C72301A8082EB52DB27E8587DA7361F78CFE0F448225AB5A5B7B5DF39C845CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$CreateHandleIconImageList_ModuleRectShow
                                                                                    • String ID: $L$ToolbarWindow32$d$shell32.dll
                                                                                    • API String ID: 1744847649-4053673454
                                                                                    • Opcode ID: ec00726696b043959fb503d2530eeb205b183dbc9545bf4d2d9651eca1e06abb
                                                                                    • Instruction ID: 14f72573145001a94804b50c9369ed43ca5d4e3a5e1751d385d7e3ab38500a66
                                                                                    • Opcode Fuzzy Hash: ec00726696b043959fb503d2530eeb205b183dbc9545bf4d2d9651eca1e06abb
                                                                                    • Instruction Fuzzy Hash: 5EA15771314A8482EBA18B63B954BAA37A1F78DFC5F444025AF0A4BF74DF3DC54A8B44
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrlen$Item$DriveFolderPathSpecial$CloseLogicalOpenStringsType_cwprintf_s_l
                                                                                    • String ID: %C:\$SoftwareOK\$UninstallString
                                                                                    • API String ID: 423617-1242695785
                                                                                    • Opcode ID: ce4a602b15cb63e03b6c9d7a59fa3f4c24bcbb6a3fbfdff46da888468d75f5d0
                                                                                    • Instruction ID: 1213c6fbc6b11f0d7670e3afec7627d9e251dbf8b966614931f2d1ab06e0adb4
                                                                                    • Opcode Fuzzy Hash: ce4a602b15cb63e03b6c9d7a59fa3f4c24bcbb6a3fbfdff46da888468d75f5d0
                                                                                    • Instruction Fuzzy Hash: BF429F72204A8082EB52DB26E8507DE73A1FB89BF4F544212E76E97AF5DF38C485C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$ItemSend$DialogPostQuit
                                                                                    • String ID: forall
                                                                                    • API String ID: 3324692860-1056140417
                                                                                    • Opcode ID: f6947c149669c0dbfbf2dbbacbf94d7a9bfeb96a041f4d752126100307eba41c
                                                                                    • Instruction ID: 87455486c33b27b8cf29d0c37acd839ce203718a171ce02a85bea06c2aac402e
                                                                                    • Opcode Fuzzy Hash: f6947c149669c0dbfbf2dbbacbf94d7a9bfeb96a041f4d752126100307eba41c
                                                                                    • Instruction Fuzzy Hash: 70B19E72700A8182FB66DB37EC55BAA73A1E78DFD5F4481209B5A4BBB4CF39C8458740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$Filelstrcmpi$CharLowerModuleName$ActiveCopyExecuteLoadMessagePathShellStringTempWindowlstrcmp
                                                                                    • String ID: -install$-runas -uninstall+"$-uninstall$_uninstall.exe$_uninstall.ini$for_all_install$forall$inst_all$install$open$runas$setup
                                                                                    • API String ID: 2504411763-1341484687
                                                                                    • Opcode ID: 8562d175aedde86520c8cd2ec8d3d0bc397fb097088fd8139ba27f20c5951f99
                                                                                    • Instruction ID: cf43a6124aa4e3bb155e5ad45821fdca4f14204c7f904ce3f0e914a877faeb3c
                                                                                    • Opcode Fuzzy Hash: 8562d175aedde86520c8cd2ec8d3d0bc397fb097088fd8139ba27f20c5951f99
                                                                                    • Instruction Fuzzy Hash: 87826272312A8082EA62DB6AE8517DA63A1F7897B4F584311E77E876F5CF3CC485C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Item$Window$Text$EnableNameUser
                                                                                    • String ID: (HKCR) $ (HKLM) $*.qdr$CLSID\{208D2C60-3AEA-1069-A2D7-08002B30309D}$CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}$CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}$CLSID\{645FF040-5081-101B-9F08-00AA002F954E}$Directory$Folder$] (HKCU)
                                                                                    • API String ID: 2733348308-1270919712
                                                                                    • Opcode ID: 5b7df7088cd7fd202b9b4ad1358d47c508a0866ecfc250b8f376fc300af9f182
                                                                                    • Instruction ID: d78f68b6f60c0c02d0dd8fcb4c0d7b7098eafab5eb59487035eb8d48594ed72f
                                                                                    • Opcode Fuzzy Hash: 5b7df7088cd7fd202b9b4ad1358d47c508a0866ecfc250b8f376fc300af9f182
                                                                                    • Instruction Fuzzy Hash: B2328272205A8086EB62DB6AE8503DA73A0FBC97B4F444311A77D8BAE5DF7DC445CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: _cwprintf_s_l$File$CopyItemMessageSend$AttributesExecuteShell
                                                                                    • String ID: %s\%s.lnk$.\Favoriten\$.\Favoriten\Quick-Link\$Favoriten$Link$Ordner$Program$\Microsoft\Internet Explorer\Quick Launch$m_lang_id$m_lang_id=%d$open$portable_install
                                                                                    • API String ID: 865069665-912432381
                                                                                    • Opcode ID: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                                    • Instruction ID: f5fd568eb4fa89ef09741f301376edfd5dbb115e4928b6f7acd597c23f9de95b
                                                                                    • Opcode Fuzzy Hash: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                                    • Instruction Fuzzy Hash: 56E1B633205A8086E7628B7AE8553DD33A0F789BB4F444302E7A99B6F2DE7DD4858740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$lstrlen$ClientIconImageList_RectSize_cwprintf_s_l
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 3730665866-1545510068
                                                                                    • Opcode ID: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                                    • Instruction ID: f515dbf1d49814e9e3407b6919e0efcb9013ed6d199b989b111f9ff7d72fbfb8
                                                                                    • Opcode Fuzzy Hash: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                                    • Instruction Fuzzy Hash: AFE16B722146C48BE765CF66E8447DEB7A0F3C8B84F548115EB8957B68CB39D865CF00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$Long$ClientCreateImageList_Screen$ClassDrivesIconLogicalReplaceShowVersion
                                                                                    • String ID: ToolbarWindow32
                                                                                    • API String ID: 842631731-4104838417
                                                                                    • Opcode ID: ba84337135d303bd3799ef85bb0cb54951ebc0608bbc2ff809f3092e0c3ffe06
                                                                                    • Instruction ID: a663587379c71f0d67b58061b540d5e2aae6d204183f87e6aeff41e5a4a8a6a9
                                                                                    • Opcode Fuzzy Hash: ba84337135d303bd3799ef85bb0cb54951ebc0608bbc2ff809f3092e0c3ffe06
                                                                                    • Instruction Fuzzy Hash: B2E19472214A9087E761DF26E858B9E77A5F788BD0F414226EB9947BB5CF38C845CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$LongMessageSend$CreateObjectText$ClassCloseCursorFontIndirectLengthNameOpenParentStocklstrcmpi
                                                                                    • String ID: Anchor Color$Anchor Color Visited$H$Software\Microsoft\Internet Explorer\Settings$static$tooltips_class32
                                                                                    • API String ID: 4016893531-15458338
                                                                                    • Opcode ID: 212ea544e0e226f010af4f5bfcc0c737a4f562a775f8519822f56687e2b46025
                                                                                    • Instruction ID: 85be3385342c9aca68e5758e7a1ed4048d160111e8e1d2afd3ed2a036945b3fd
                                                                                    • Opcode Fuzzy Hash: 212ea544e0e226f010af4f5bfcc0c737a4f562a775f8519822f56687e2b46025
                                                                                    • Instruction Fuzzy Hash: 44E16172204B8186EB72DF26F4847DEB3A1F788B90F544126EB9A47AB4DF78D545CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$MessageSend$EnableWindow$LoadStringlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1173643101-0
                                                                                    • Opcode ID: 7c7d513955768bfae79e3a188177268da00716552af1d794ceb65d20afd4135a
                                                                                    • Instruction ID: 6dabcdcea65f6328270f3a14a4be7ba257ce24461f4ee2d6b5f721c516a55c37
                                                                                    • Opcode Fuzzy Hash: 7c7d513955768bfae79e3a188177268da00716552af1d794ceb65d20afd4135a
                                                                                    • Instruction Fuzzy Hash: 09512F71602A9182F766DF76ED1479A3361EBCDFA5F1881219B050BAB8CF3DC885C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMessage$Send$lstrlen$ByteCharEnableMultiWideWindow_cwprintf_s_l
                                                                                    • String ID: %d$Folder
                                                                                    • API String ID: 1125211564-3146767445
                                                                                    • Opcode ID: d5c5b766d43663587aaf605c0f3c775f4b55a46af071f10d0a1cd3309bd6e41c
                                                                                    • Instruction ID: 21c51c626c70cd87c04718b6dab06da61f7cb9eb7a6040d354ccdd7e0e2232fa
                                                                                    • Opcode Fuzzy Hash: d5c5b766d43663587aaf605c0f3c775f4b55a46af071f10d0a1cd3309bd6e41c
                                                                                    • Instruction Fuzzy Hash: 73D1707230198082EA52DB6AE8547DA63A1F7C9BF4F544712AB2E4BBF5DE3DC8418740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoad
                                                                                    • String ID: @ $ToolbarWindow32
                                                                                    • API String ID: 2619053042-323118299
                                                                                    • Opcode ID: ba8c7da73fdf4611577f9cc5b69f03cab2a023da74b4aa09a77eb4ab799658c9
                                                                                    • Instruction ID: 86fd8192aee64fd393b297de248f850f55717a7b1b35142793763b7c302a9f68
                                                                                    • Opcode Fuzzy Hash: ba8c7da73fdf4611577f9cc5b69f03cab2a023da74b4aa09a77eb4ab799658c9
                                                                                    • Instruction Fuzzy Hash: E0C1BE72215BD086E7A1CB26F8147AE77A1F38CBD4F548125EB8A47BA4DB3DC480CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendWindow$Long$CreateFileInfo$DirectoryShowWindows
                                                                                    • String ID: 0$EDIT$ToolbarWindow32
                                                                                    • API String ID: 1204497882-763659013
                                                                                    • Opcode ID: 834bd5d7253893d8378540521d87bfc067c0ff6e5eb3ea9cc8ff4f094263d16a
                                                                                    • Instruction ID: a7e7e59726aa6b583e4861d0486cd2d186bfd6f2536b9c675329a7200f04048f
                                                                                    • Opcode Fuzzy Hash: 834bd5d7253893d8378540521d87bfc067c0ff6e5eb3ea9cc8ff4f094263d16a
                                                                                    • Instruction Fuzzy Hash: BAA12C72214B808AE761CF26E8807CE7BA1F788B94F54412AEB8D57F68DF39C545CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$GlobalWindow$Lock$FindLoad$AllocContextCreateDialogErrorHelpLastRectStreamUnlock
                                                                                    • String ID: AtlAxWinLic90
                                                                                    • API String ID: 3889352284-3795641830
                                                                                    • Opcode ID: de0d6f08919c3052e159f00e3193dda42f239365d0447abbbd27013998200e8d
                                                                                    • Instruction ID: 51d079df90b8a02c2a86cf8d9dc758cc88ac7561a0772db8427750d37b632643
                                                                                    • Opcode Fuzzy Hash: de0d6f08919c3052e159f00e3193dda42f239365d0447abbbd27013998200e8d
                                                                                    • Instruction Fuzzy Hash: 13D16F3620469086EB65DF62E4503EA73A1F78CBC4F188526FB5A4FBB4DB7AD844C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window$CreateFileInfoLong$DirectoryFolderLocationMetricsParentRectShowSpecialSystemWindows
                                                                                    • String ID: ToolbarWindow32$d
                                                                                    • API String ID: 3673439606-1364537291
                                                                                    • Opcode ID: da462dc776a07fecd68a21ef27e8583de3242e8132480acd492de46ce9948398
                                                                                    • Instruction ID: 9830e13c2f5f986fa01b6c7e6cdaa0575e950eba642a179dc9f7cec8fa218f83
                                                                                    • Opcode Fuzzy Hash: da462dc776a07fecd68a21ef27e8583de3242e8132480acd492de46ce9948398
                                                                                    • Instruction Fuzzy Hash: 15A16C7620468087E765DF26E8507DEB3A1F78CB94F544025EB8A8BB75CF39C94ACB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Color$Object$CreateDeleteFontImageIndirectInfoList_ParametersStockSystemlstrcpyn
                                                                                    • String ID:
                                                                                    • API String ID: 736779183-0
                                                                                    • Opcode ID: c3f1514e4f68a04fa89be1a1f15611e863bbab2ef3d5545d52e0b845c764d121
                                                                                    • Instruction ID: 6f0317fa6f4633671fe8009c8507364e7b93cdd0de32c02e3e1814570969f199
                                                                                    • Opcode Fuzzy Hash: c3f1514e4f68a04fa89be1a1f15611e863bbab2ef3d5545d52e0b845c764d121
                                                                                    • Instruction Fuzzy Hash: D051403521064082E7929BB3E865BE97362EB8CFD5F449015DF095BFB4DE39C8858B50
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Item$DestroyMessageSendlstrlen$CountInfo$ByteCharLoadMultiWide_cwprintf_s_l
                                                                                    • String ID: ID:%d$ | $10900$H$InitLangCombo-ERR$P
                                                                                    • API String ID: 2576854577-3851071048
                                                                                    • Opcode ID: b755c7a2f0a5b9e27a8672cc3b79c1c9fff2e32756b21b6200b3ea2545efba30
                                                                                    • Instruction ID: 20116706675992dc0dd6a543d8b96af0499e673c97be450d8ca5d57fafb5b745
                                                                                    • Opcode Fuzzy Hash: b755c7a2f0a5b9e27a8672cc3b79c1c9fff2e32756b21b6200b3ea2545efba30
                                                                                    • Instruction Fuzzy Hash: 28B1A272215A4182EA62DB2AE8417EA7360FB8DBF4F444212AF6D476F5DF78C845CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$Close$lstrlen$File$Delete$DirectoryNextRemove
                                                                                    • String ID: *.*$.
                                                                                    • API String ID: 1219767574-358234090
                                                                                    • Opcode ID: a89af37bb8a894edc39e6472b1449ba87969c6883525ffa567b5d99f45521776
                                                                                    • Instruction ID: 63b703b6d4bd9990a1e04bcf9a008da59e47041a9f1cfcebd5386c86394f25f3
                                                                                    • Opcode Fuzzy Hash: a89af37bb8a894edc39e6472b1449ba87969c6883525ffa567b5d99f45521776
                                                                                    • Instruction Fuzzy Hash: C8026472204A8086EB62DF66E8903DD73A1F78C7E4F184225F76E8B6E5DE79C495C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Client$CreateItemLibraryObjectRectScreenSelect$CompatibleFreeLoadMessageReleaseSectionSendWindow
                                                                                    • String ID: ($PNG$bitmap9.jpg
                                                                                    • API String ID: 730289181-2908563061
                                                                                    • Opcode ID: 09fbaf4045a4607f18a197df20f88c37a2a963bc86c1ec830f2e47abbfd2117b
                                                                                    • Instruction ID: e3f5f732d1241b50202e92e1289a60451ceede66af42e874af80bba1de0125b7
                                                                                    • Opcode Fuzzy Hash: 09fbaf4045a4607f18a197df20f88c37a2a963bc86c1ec830f2e47abbfd2117b
                                                                                    • Instruction Fuzzy Hash: 24513972218B818AE751DF26E41839EB360F788BD6F145125EB8A07BA9CF7DC449CF40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CreateObject$CommonControlsFontIndirectInitStockWindow
                                                                                    • String ID: $ToolbarWindow32$d
                                                                                    • API String ID: 2235514304-853020219
                                                                                    • Opcode ID: 04f20807d92875e8a941c46ab5e9a55c7c36849dd24a71f01fe2bb3f4ca10e66
                                                                                    • Instruction ID: 81380e565916d0e3a220b6bcff18d90d1e69f70c6a8208045f8504cb5dddd19f
                                                                                    • Opcode Fuzzy Hash: 04f20807d92875e8a941c46ab5e9a55c7c36849dd24a71f01fe2bb3f4ca10e66
                                                                                    • Instruction Fuzzy Hash: BF61E1722146908BE761CF26F854BEA77A0F788F99F544114EF990BEA9DB3CC546CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$PathTemplstrlen$ByteCharCloseCreateExecuteHandleModuleMultiNameShellWideWrite_cwprintf_s_l
                                                                                    • String ID: ###$:Repeat###DEL "%s"###if exist "%s" goto Repeat###DEL "%s"###$_selfdestruct.bat$open
                                                                                    • API String ID: 526318972-2663367853
                                                                                    • Opcode ID: e0ef0da1caaaa179e51490a716369e6204e6a809852cf07e17a30ec8e6058aa4
                                                                                    • Instruction ID: 604c710743bc7a9a6ac54444303196fb82ccd627159c2c83cb5586e85e4cd396
                                                                                    • Opcode Fuzzy Hash: e0ef0da1caaaa179e51490a716369e6204e6a809852cf07e17a30ec8e6058aa4
                                                                                    • Instruction Fuzzy Hash: 8BA15F72200A848AEB21DF76E8517D933A1F789BBCF444315E7294BAE9DF39C549C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$FolderFromListLocationPathSpecial$Find$File$ClientCloseFirstItemNextRectwsprintf
                                                                                    • String ID: %s\*.*
                                                                                    • API String ID: 1191195382-1013718255
                                                                                    • Opcode ID: 3c00cfffc44c41f7e8bd55f77a1b329c62eebd74909f82033aaa9ab621b4b593
                                                                                    • Instruction ID: e4b2a812987430f71ac264499f6ae7b7a1df3c62e0169e7262ed86d878a5f268
                                                                                    • Opcode Fuzzy Hash: 3c00cfffc44c41f7e8bd55f77a1b329c62eebd74909f82033aaa9ab621b4b593
                                                                                    • Instruction Fuzzy Hash: D551C372214A8082E761CB26F8547DB73A0F78DBE5F849211DB9D47AA8DF7DC149CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientMessageRectSendShow$Folder$DesktopLocationSpecial
                                                                                    • String ID:
                                                                                    • API String ID: 410288209-0
                                                                                    • Opcode ID: 322aa77159f3c7b8964ab516e3fed0feb13d7947f0b69d87805b915b5fec351c
                                                                                    • Instruction ID: 942626af1d8c366efc04faf1e635a78e2675706e48596580cf5a1b9c9d0c1d8e
                                                                                    • Opcode Fuzzy Hash: 322aa77159f3c7b8964ab516e3fed0feb13d7947f0b69d87805b915b5fec351c
                                                                                    • Instruction Fuzzy Hash: A8A12972204B8486E761DF26E4403DAB761F789F94F588129EF8D0BB69DF79C985CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientMessageOffsetRectSend$Screen$ClipExcludePoints
                                                                                    • String ID:
                                                                                    • API String ID: 986806451-0
                                                                                    • Opcode ID: 8c00654a11622e0dcc756902661d98b627de24cb9cdf065ffea1d5c81ef6825d
                                                                                    • Instruction ID: 00f282a4903dedcf0ef504674032e559c766e118f53e70da6700473c5c189a97
                                                                                    • Opcode Fuzzy Hash: 8c00654a11622e0dcc756902661d98b627de24cb9cdf065ffea1d5c81ef6825d
                                                                                    • Instruction Fuzzy Hash: 7E414676624A9087E7618F26F944B8ABBB0F38CFC4F545116EF4A47B28CB79C405CB80
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Malloc$ClientFileInfoRectWindow
                                                                                    • String ID: 0
                                                                                    • API String ID: 30954516-4108050209
                                                                                    • Opcode ID: cb529b6333ca4705a5f3cca5ab3b9139987fc52c36c606cb42ce1bf2cc7aac13
                                                                                    • Instruction ID: e8b1978d66d724abf10e59701e6cad1c3fbe022964d49da35ceb54ce9944eccd
                                                                                    • Opcode Fuzzy Hash: cb529b6333ca4705a5f3cca5ab3b9139987fc52c36c606cb42ce1bf2cc7aac13
                                                                                    • Instruction Fuzzy Hash: F4E1A072204A8486EB62DB26E4547DEB3A1F389BD4F444216EB6D47BF5CF38D985CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrlen$wsprintf
                                                                                    • String ID: entry_%03d$last_entry
                                                                                    • API String ID: 2298119551-2593065581
                                                                                    • Opcode ID: 008a9c5fa7d62b771aece80f0896661768ff2290b8738e3542514f7c33eedfca
                                                                                    • Instruction ID: 86b7992cb3d53b04f29448162b060c05a39dc93cda4563d4c974ff5a86073e78
                                                                                    • Opcode Fuzzy Hash: 008a9c5fa7d62b771aece80f0896661768ff2290b8738e3542514f7c33eedfca
                                                                                    • Instruction Fuzzy Hash: 4B41707231099192FB65DB63F895BDA6291EBCDBC5F844021EF4A4BE66DE38C1058B40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Menu$CountTextWindow$DestroyLoadNameUserlstrlenwsprintf
                                                                                    • String ID: (%s)$ : $ :
                                                                                    • API String ID: 2736554328-3115013952
                                                                                    • Opcode ID: 8bea115dbcc29a40e9f58431ff469bb674405865f8bc93ee5614254e6215e2c4
                                                                                    • Instruction ID: e5e2c9bbcaf9d65b956141474eec2938d927ba4a8729c901ff62d07cde69ad73
                                                                                    • Opcode Fuzzy Hash: 8bea115dbcc29a40e9f58431ff469bb674405865f8bc93ee5614254e6215e2c4
                                                                                    • Instruction Fuzzy Hash: 92C181713155C083EA52E726E8617EB6351E7C9BE0F504321B76E87AEADF3CC9468780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$LongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 312131281-0
                                                                                    • Opcode ID: 629fe9a901e9e4e3983290e0bba541c7e3961e35d00cdc6b188e1ac93bd33edb
                                                                                    • Instruction ID: f096e6b5f0a2cd21c5e5c735ad634d3faffd7a5d715f354c575d3811cd53caa3
                                                                                    • Opcode Fuzzy Hash: 629fe9a901e9e4e3983290e0bba541c7e3961e35d00cdc6b188e1ac93bd33edb
                                                                                    • Instruction Fuzzy Hash: 8A314E36314A5082EB719B62F8A5B9A7760E7CCBE9F445111AF4D0BF75CE3DC1858B00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$Closelstrlen$ErrorFileFirstFullLastNamePathlstrcpy
                                                                                    • String ID: *.*
                                                                                    • API String ID: 3592433370-438819550
                                                                                    • Opcode ID: d7caec423a6b86632392b46f711556e635fc092a3b313932cd0b667e2973d7b2
                                                                                    • Instruction ID: 6639bd9ae3950c3fc4ce81febd3fa46d1e6c52afffb5cbacca2b2e4680caa3b1
                                                                                    • Opcode Fuzzy Hash: d7caec423a6b86632392b46f711556e635fc092a3b313932cd0b667e2973d7b2
                                                                                    • Instruction Fuzzy Hash: E93181B1604A4081EA51DF26E6487A93391E74DFE4F580324EB2E4BBF4DF7EC4828355
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientRect$#190AddressFolderLibraryLoadLocationProcSpecial
                                                                                    • String ID: d$d$d
                                                                                    • API String ID: 2660539279-1898527202
                                                                                    • Opcode ID: 71c33372302f916ebc354bbbe30eccb46d4915fba6f3a10c20ba7567cc0c0410
                                                                                    • Instruction ID: a6f3bc1b3df756f0986c1d608cc1a7eeb1e4ca896bd857a2471bc125daaf5835
                                                                                    • Opcode Fuzzy Hash: 71c33372302f916ebc354bbbe30eccb46d4915fba6f3a10c20ba7567cc0c0410
                                                                                    • Instruction Fuzzy Hash: 52E16C76205A8482EB21DF26E4907DEB361F789FD4F448126EB9E47BA5DF39C548CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateMenuPopup
                                                                                    • String ID: A:\$B:\
                                                                                    • API String ID: 3826294624-1009255891
                                                                                    • Opcode ID: 10cbcbbae597c01d781b4ad2bf177acf0c66034345fd2a8dc4432be5cca0da1f
                                                                                    • Instruction ID: 604ee408bf97461fa7ae356aabdbf716d6fd73ca5e4ce1517ef24e6503e624d5
                                                                                    • Opcode Fuzzy Hash: 10cbcbbae597c01d781b4ad2bf177acf0c66034345fd2a8dc4432be5cca0da1f
                                                                                    • Instruction Fuzzy Hash: B9C1C172218A8082EB62DB26E9507DEA361F78CBD4F444116EF8D57BB9DF78C545CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$MessageSend$ByteCharFileInfoMultiWidelstrcat
                                                                                    • String ID: 0$o$p
                                                                                    • API String ID: 2028529823-2855627637
                                                                                    • Opcode ID: 1b963002c905acdd9e4b1c3cbb92eebd2488d5de023baa553beeb7a623ec9a00
                                                                                    • Instruction ID: 3be114c49241565be9ad57c24d918b27290463d7114049797c8fd31369fbb42a
                                                                                    • Opcode Fuzzy Hash: 1b963002c905acdd9e4b1c3cbb92eebd2488d5de023baa553beeb7a623ec9a00
                                                                                    • Instruction Fuzzy Hash: 77719D32204A8181EA52EB2BE8513EA6361FBDDBF4F804316BB6D476F5DE38C945C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1872618283-0
                                                                                    • Opcode ID: 594cd973ebf979aee4e0bde8c44eb27d035c6e478d97713dde4b44e7a8cf85c9
                                                                                    • Instruction ID: be190ecb7c61bb58360671a9dd132366ebcc16387152280a04eaceafb3a8eab2
                                                                                    • Opcode Fuzzy Hash: 594cd973ebf979aee4e0bde8c44eb27d035c6e478d97713dde4b44e7a8cf85c9
                                                                                    • Instruction Fuzzy Hash: 6C216032201A4085EA62EB36E8553EA6761EB88FF4F480335AB6D477F6DF38C545C744
                                                                                    APIs
                                                                                      • Part of subcall function 0000000140003AE4: lstrlenA.KERNEL32 ref: 0000000140003B08
                                                                                      • Part of subcall function 0000000140003AE4: MultiByteToWideChar.KERNEL32 ref: 0000000140003B86
                                                                                      • Part of subcall function 0000000140003AE4: lstrlenW.KERNEL32 ref: 0000000140003BA2
                                                                                    • GetTimeZoneInformation.KERNEL32 ref: 00000001400262AF
                                                                                      • Part of subcall function 000000014000399C: lstrlenA.KERNEL32 ref: 00000001400039CA
                                                                                      • Part of subcall function 000000014000399C: MultiByteToWideChar.KERNEL32 ref: 0000000140003A0F
                                                                                      • Part of subcall function 000000014000399C: lstrlenW.KERNEL32 ref: 0000000140003A2B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ByteCharMultiWide$InformationTimeZone
                                                                                    • String ID: com$http$https
                                                                                    • API String ID: 1891917992-1205338474
                                                                                    • Opcode ID: 7f8d9ded14d1b2e1fbde5ff34204a7be8db8e8b6ccaffbc52d971124b6693e83
                                                                                    • Instruction ID: 7e7559996cf9e42fc57bdc9444302e077bc977e404b3c2ff2fd3f9c16d10a7aa
                                                                                    • Opcode Fuzzy Hash: 7f8d9ded14d1b2e1fbde5ff34204a7be8db8e8b6ccaffbc52d971124b6693e83
                                                                                    • Instruction Fuzzy Hash: F3918332309680C1EB02DB7AD8497ED37A0A749BE4F580219E7AD472F6CB7ACD45C761
                                                                                    APIs
                                                                                      • Part of subcall function 000000014000A9E8: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140001249), ref: 000000014000AA2C
                                                                                    • GetPrivateProfileStringW.KERNEL32 ref: 0000000140085466
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,for_all_install,Program,0000000140085790), ref: 0000000140085478
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$PrivateProfileString
                                                                                    • String ID: Program$for_all_install
                                                                                    • API String ID: 2516951217-68737091
                                                                                    • Opcode ID: ccdaf7ac6400ac0d2139999ccba3a0792c53768118820b3a4d037f2c4a500497
                                                                                    • Instruction ID: 80b73980f0693fcc24a34737d6480afba8fa95c67a586a6b7372958da9185dee
                                                                                    • Opcode Fuzzy Hash: ccdaf7ac6400ac0d2139999ccba3a0792c53768118820b3a4d037f2c4a500497
                                                                                    • Instruction Fuzzy Hash: 39213B72210A808AE741EF26E85439E6764F78DFF4F544221BF6E877E5CB78C5518740
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: AXWIN
                                                                                    • API String ID: 0-1948516679
                                                                                    • Opcode ID: 7df18f6fc35f79ed49c0cdb56dd8ed769362352c57863fe6de571a2c61cdd53e
                                                                                    • Instruction ID: c75c99f80d397147d35b2e3c87a1350abe42652442c41f81fb8e6d27de36be4a
                                                                                    • Opcode Fuzzy Hash: 7df18f6fc35f79ed49c0cdb56dd8ed769362352c57863fe6de571a2c61cdd53e
                                                                                    • Instruction Fuzzy Hash: 3FF1E476201A8582EB69CF2AE4947DEB3A0FB89F84F448112DF9E47764DF3AD548C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timer$AsyncKillState
                                                                                    • String ID:
                                                                                    • API String ID: 3065476933-0
                                                                                    • Opcode ID: c61981b638d52854e934b5ce57fdcafba756d400136af1b0950cb53aa9c6da54
                                                                                    • Instruction ID: 83b0dc558db1e19b8b48179a39578b0fa32cfe84b150e48cabf1ca8d5a4039f0
                                                                                    • Opcode Fuzzy Hash: c61981b638d52854e934b5ce57fdcafba756d400136af1b0950cb53aa9c6da54
                                                                                    • Instruction Fuzzy Hash: ACE0927170058182EB1ADB63F4213A92224E79CFD2F084020EF460B3A2CE3AC8918750
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$Char$ByteCreateExitFileLowerMessageModuleMultiNameProcessThreadWide
                                                                                    • String ID: $ $ $ $ $ $ $ $ $!$"$" D$)$-$:$:$D$F$\$_$_$a$a$a$a$a$a$b$b$c$c$c$d$d$d$e$e$e$e$e$e$e$e$f$g$g$g$g$g$g$h$i$i$i$l$l$m$m$n$n$n$n$o$o$o$o$o$p$p$p$p$p$r$r$r$r$r$r$s$s$s$t$t$t$t$u$u$u$u$y
                                                                                    • API String ID: 1514836828-1553105431
                                                                                    • Opcode ID: 719c199602d7c0d595f80c0376d60695d33414ffac813049b189e6f0c892736d
                                                                                    • Instruction ID: 0000cabaad5d0256930fbd365e5a08f5630db3a31c77a4ec0ff25ac1f530c258
                                                                                    • Opcode Fuzzy Hash: 719c199602d7c0d595f80c0376d60695d33414ffac813049b189e6f0c892736d
                                                                                    • Instruction Fuzzy Hash: 39D1042210C7C0C9E722C739E45839BBF91E396758F084149A7D84BAEACBBFD454CB61
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSystem$Metrics$SendWindow$Item$ImageLoadlstrlen$LongModuleParentText_cwprintf_s_l$ByteCharDialogFileHandleInfoMultiNameParametersPostPrivateProfileQuitRectWide
                                                                                    • String ID: /SILENT$/silent$INI-ERROR(1)$Start$Uninstall $lng$m_lang_id$shell32.dll
                                                                                    • API String ID: 3653856717-4112181553
                                                                                    • Opcode ID: f426cc110dd81f1611d680e901cdbaac693459b74df1e959f7455f889dac0596
                                                                                    • Instruction ID: 752e121248e5594991b823083c66e510f566f5baf012ee6191a8888a2bbc9a33
                                                                                    • Opcode Fuzzy Hash: f426cc110dd81f1611d680e901cdbaac693459b74df1e959f7455f889dac0596
                                                                                    • Instruction Fuzzy Hash: 151248B2300A8086EA52DF2AE8547D933A1F78CBE4F544212EB6D6B6F5DF39C5858740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProclstrlen$ByteCharCurrentMultiProcessWide
                                                                                    • String ID: .$2$3$D$I$K$NtQueryInformationProcess$P$b$d$e$e$e$e$e$e$g$g$l$l$l$n$n$ntdll.dll$r$r$r$s$s$t$u
                                                                                    • API String ID: 2955559129-2032009382
                                                                                    • Opcode ID: 83936a6e60971807bd9a841582d71c7bc9abb7deebbfde0675ab1a4d8166ddc1
                                                                                    • Instruction ID: ebb7062b7830e2f6201c3ee88f5bab5457eb83f6b9f17b420c99f5bab9962169
                                                                                    • Opcode Fuzzy Hash: 83936a6e60971807bd9a841582d71c7bc9abb7deebbfde0675ab1a4d8166ddc1
                                                                                    • Instruction Fuzzy Hash: 8C41542210C7C085F752C769E40435ABFD1D796BA8F080159A7D90B6EACBFFC448CB21
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ColorLongRedraw
                                                                                    • String ID: 7$:$M$h$l$m$m$s$t
                                                                                    • API String ID: 4056730343-774144524
                                                                                    • Opcode ID: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                                    • Instruction ID: 78b4388999416cd18bfcb0f14d0a6cd4aa7666f392b8eb34da5cf203a5b0034f
                                                                                    • Opcode Fuzzy Hash: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                                    • Instruction Fuzzy Hash: 99E1B432208A8481EB62DF66E4443ED77A5F788BD4F548116EB4A5F7B8CF7AC884C741
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDeleteObject$Compatible$BitmapColorRestoreSaveSelect$AlphaBlendBrushFrameRectSolidText
                                                                                    • String ID:
                                                                                    • API String ID: 2299858245-3916222277
                                                                                    • Opcode ID: d8a10fb40862b8792894005f81b4c280e102807db963039045cda572e127b124
                                                                                    • Instruction ID: 7f65cc1d17b691afa23bbaa84f5afc78dc83da2c72959074ca907df5fa96d52b
                                                                                    • Opcode Fuzzy Hash: d8a10fb40862b8792894005f81b4c280e102807db963039045cda572e127b124
                                                                                    • Instruction Fuzzy Hash: 3671F6766186C18AD7658F26B8447AABBA0F7CDBD0F144129EF8A47B28DF3DC445CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$#190$DragDrop$FileFindInfoPrivateProfileRegisterRevokeSettings_cwprintf_s_llstrlen
                                                                                    • String ID: SysTreeView32$Tree_Folder$explorer$shell:::{323CA680-C24D-4099-B94D-446DD2D7249E}$shell:::{679f85cb-0220-4080-b29b-5540cc05aab6}
                                                                                    • API String ID: 71843160-2751362909
                                                                                    • Opcode ID: cdac5fd20af3815c5539bf1089f494692801393276e1bef8d54d18d1450fe6dc
                                                                                    • Instruction ID: 244ed6fa58f986c0078e1fcb5a61dd850c8ccb0a1c49473f59fd0f2105532851
                                                                                    • Opcode Fuzzy Hash: cdac5fd20af3815c5539bf1089f494692801393276e1bef8d54d18d1450fe6dc
                                                                                    • Instruction Fuzzy Hash: 30E17C36310A4082EB62AB27E8547DA73A1F79DBD9F145315EB5A47BB0DF39C485CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$ImageLoadLongMessageSendWindow$CreateCurrentHandleInstanceModuleThreadTimer
                                                                                    • String ID: GGGGGGGGGGGGGG3333w$shell32.dll
                                                                                    • API String ID: 3538168692-247136160
                                                                                    • Opcode ID: 4bb10a95a415b1ce70e46ca354cb0b19f6a599b72350abaae7d7e4cd84a218e4
                                                                                    • Instruction ID: effaa9e81f3de398a63732d4e63c0a9843874db65c23d4bb19153361ae8e52cb
                                                                                    • Opcode Fuzzy Hash: 4bb10a95a415b1ce70e46ca354cb0b19f6a599b72350abaae7d7e4cd84a218e4
                                                                                    • Instruction Fuzzy Hash: 39613771300A4086E752DB36E85479A73A0F788BE5F548221EB5A8BAB9DF39C949C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ByteCharMultiWide
                                                                                    • String ID: .$.$/$/$:$Start$a$auto_update_domain$com$e$f$h$k$o$o$p$r$s$t$t$t$w$w$w$w
                                                                                    • API String ID: 477651035-1038781873
                                                                                    • Opcode ID: 652a20e7a2572e4ecdc1d2d50a95e814720ad845413677b369cbd449c423dca3
                                                                                    • Instruction ID: 605818b88a422d67cb553fba9621f2b72a2fa53064d5ecd022150907ca5edf59
                                                                                    • Opcode Fuzzy Hash: 652a20e7a2572e4ecdc1d2d50a95e814720ad845413677b369cbd449c423dca3
                                                                                    • Instruction Fuzzy Hash: 5481913220868086E752CB3AE8487DD77A5F389BD8F584215F79C476BACB7DC949CB10
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$Draw$ObjectSelect$ColorFocus$RectWindow$CompareEnabledModeString$ClientLonglstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2647594523-0
                                                                                    • Opcode ID: 3f8b05972cd6593dca4c03298b517c35b8d4a0e53a8c6a34df1d6091895320e8
                                                                                    • Instruction ID: b8d4a4a28b2fd228c5ce2ab35eb3cdbf29f8c14fc72cabab91998f43d8c5e881
                                                                                    • Opcode Fuzzy Hash: 3f8b05972cd6593dca4c03298b517c35b8d4a0e53a8c6a34df1d6091895320e8
                                                                                    • Instruction Fuzzy Hash: E4A14D76604B8486EBA1DF26E44479E73A1F789F94F044022EF8D4B768CF79C889C780
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$MessageSend$AllocFolderGlobalLocationSettingsSpecial
                                                                                    • String ID: g
                                                                                    • API String ID: 1528256793-30677878
                                                                                    • Opcode ID: 9d70cd2dfe3b08ff4a48f132ec8a9e10b75704701d64df2a7dac44062355b066
                                                                                    • Instruction ID: 3535d59f8bcc30ae388a77284d4861c99e2a340e566c5f91dd2fabfe10c68ed7
                                                                                    • Opcode Fuzzy Hash: 9d70cd2dfe3b08ff4a48f132ec8a9e10b75704701d64df2a7dac44062355b066
                                                                                    • Instruction Fuzzy Hash: 0C81C336200B9096E7659F63E8147D9B3A1F38CBA4F184225EF5A47BA4CF79C495C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateObjectRect$DeletePaint$BeginBrushClientCompatibleFillSelectSolid$Bitmap
                                                                                    • String ID:
                                                                                    • API String ID: 2927874120-3916222277
                                                                                    • Opcode ID: cd3790e350a686f5605ec883355a0ac94a9e3c6f6c0e2ca7b725501f9cc9a2d6
                                                                                    • Instruction ID: a5e84ae98cffd5e6033d0197016375aed9d9d0d7b093881bcabc453147b6fcf2
                                                                                    • Opcode Fuzzy Hash: cd3790e350a686f5605ec883355a0ac94a9e3c6f6c0e2ca7b725501f9cc9a2d6
                                                                                    • Instruction Fuzzy Hash: 1A513B32215B84C6EB51CB26E85879973A0F78CFD9F184125EF490BB68DF3AD849CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$MenuParent$AppendMalloc$ClientCountItemScreen
                                                                                    • String ID: 0$0
                                                                                    • API String ID: 3922845531-203156872
                                                                                    • Opcode ID: 7ce9dacb1bc64561837ac27299ddedabc1a54e358a56596400871af15922fa3b
                                                                                    • Instruction ID: 7f67bf3373ce3a456f9989ec7ffe31b5fd478d69111acfe88976eef59cd645a9
                                                                                    • Opcode Fuzzy Hash: 7ce9dacb1bc64561837ac27299ddedabc1a54e358a56596400871af15922fa3b
                                                                                    • Instruction Fuzzy Hash: 67A14A72215A8082EB66DF23E8547DAB3A1F389BC0F444526EB9A47BB4CF78C945C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$InitializeLengthProcTextUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 2434527812-0
                                                                                    • Opcode ID: 82c245bcf7b4fbf843697dfbe54cce4bd7381970a776bb4d117c168738b632a9
                                                                                    • Instruction ID: 8cf8d774629b1b792a8639e8062def99c3f65678199ee207a8be0d27a644c741
                                                                                    • Opcode Fuzzy Hash: 82c245bcf7b4fbf843697dfbe54cce4bd7381970a776bb4d117c168738b632a9
                                                                                    • Instruction Fuzzy Hash: 63B16D32210B4486EB169F76D8957EC23A1FB4DFE9F444616EB6A4B7E4CF3AC4058341
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharNext$lstrlen
                                                                                    • String ID: %*.*f
                                                                                    • API String ID: 2675299387-4192566172
                                                                                    • Opcode ID: 3fe3da11784543e7d843720205ee1903bdd7cf345871e15eea4f6f606d473c2e
                                                                                    • Instruction ID: b4c1326da23ca97ccb6389a22e72082814a40bd792c4521e559d803615b2f45d
                                                                                    • Opcode Fuzzy Hash: 3fe3da11784543e7d843720205ee1903bdd7cf345871e15eea4f6f606d473c2e
                                                                                    • Instruction Fuzzy Hash: D6F1F0B660058086FB67EB2BB4183FD62A5F78CBD4F584125EB4A57AF5DB39C881C304
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ChildClientEnumFindMessageRectSendWindowWindows
                                                                                    • String ID: DirectUIHWND$ExplorerBrowserControl$SHELLDLL_DefView
                                                                                    • API String ID: 2244855869-1440848835
                                                                                    • Opcode ID: 2db28bb5557562a58c2644c040114c9b314b45ed66c8f42ec6329950f32d5d23
                                                                                    • Instruction ID: 19e13b132ccd2bc1de6f136affa5222679d2e3b2ef6ec66a0a3b391420adb10d
                                                                                    • Opcode Fuzzy Hash: 2db28bb5557562a58c2644c040114c9b314b45ed66c8f42ec6329950f32d5d23
                                                                                    • Instruction Fuzzy Hash: 03717B76205B8586E721CF2AF4447DEB7A1F38CB94F588116EB8947B68CF38D545CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: @
                                                                                    • API String ID: 3850602802-2766056989
                                                                                    • Opcode ID: 506a9e84d50b33111a1198a0e148b46ceb310e651111313180a6cc95f79cd3ed
                                                                                    • Instruction ID: 0d5ae8482496c7f196bcce93c5f7b0b60ed7bc0d716a224a47e07afa40e4b180
                                                                                    • Opcode Fuzzy Hash: 506a9e84d50b33111a1198a0e148b46ceb310e651111313180a6cc95f79cd3ed
                                                                                    • Instruction Fuzzy Hash: 75915F72301A8185EAA6DB27D8143DA63A1FB8DFE4F588221EF5E47BF5DE38C4458740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow$Item
                                                                                    • String ID:
                                                                                    • API String ID: 1634842743-399585960
                                                                                    • Opcode ID: d0eb64c64491e78d806cf463c01866d714f33d2d6f22bc7205a40fdb4f28b78c
                                                                                    • Instruction ID: b98239d54e89be5522a862e65fcfb4c44f4c28e5a87ac5a149d5a7240b3af8cb
                                                                                    • Opcode Fuzzy Hash: d0eb64c64491e78d806cf463c01866d714f33d2d6f22bc7205a40fdb4f28b78c
                                                                                    • Instruction Fuzzy Hash: B671FD72301A4082EA52DB6BEC543997361FB89BF0F544312AB7E876F5DF38C8468750
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassRegister$CriticalCursorInfoLoadMessageSectionWindow$EnterLeave
                                                                                    • String ID: AtlAxWin90$AtlAxWinLic90$WM_ATLGETCONTROL$WM_ATLGETHOST
                                                                                    • API String ID: 185448633-2573294316
                                                                                    • Opcode ID: 4a4dc0a71a64f910c3efcc53002b9c8d915b523e739c08cd6505fd3f4404b1fa
                                                                                    • Instruction ID: 7986171e3b76222582f8c06ca4b60176ae19bcc8dc82d8985c2837d70915d36b
                                                                                    • Opcode Fuzzy Hash: 4a4dc0a71a64f910c3efcc53002b9c8d915b523e739c08cd6505fd3f4404b1fa
                                                                                    • Instruction Fuzzy Hash: 0951E635208B8596E761DF12F88039AB7A4F78CB84F95011AE68E47A78DF7DC549CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderFromListLocationPathSpecial$lstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2171393036-0
                                                                                    • Opcode ID: 2835668d920c6853f3b9b5fbe382529ce3e10aa3ddf79edbf2245ad07d7e8bd2
                                                                                    • Instruction ID: 3df3694dcbe8bfb052228d495dc6f9bc1892484a80861c3acf91ae587dc0808f
                                                                                    • Opcode Fuzzy Hash: 2835668d920c6853f3b9b5fbe382529ce3e10aa3ddf79edbf2245ad07d7e8bd2
                                                                                    • Instruction Fuzzy Hash: 13513276701A8086EA01EB23E9583EE6360FB8DFC4F444022EF0A4B729DF79C419C780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$InitializeLengthProcTextUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 2434527812-0
                                                                                    • Opcode ID: 227c9dd65ee7533fb1e84d7316d8b4941004fe8c613ba2a53903bd98b2763ab7
                                                                                    • Instruction ID: 76dc4582497b9bdb2348e122cf3ea98d43fabccae93ac3cae806c58874e0c8c8
                                                                                    • Opcode Fuzzy Hash: 227c9dd65ee7533fb1e84d7316d8b4941004fe8c613ba2a53903bd98b2763ab7
                                                                                    • Instruction Fuzzy Hash: CBA16B32210B4086EB169F67D854BE823A1FB4DFE8F544616EB2A4BBF4DF7AC4458340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectSelect$DrawText$ClientRectReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1355666434-0
                                                                                    • Opcode ID: 893e0c766cdfdd3461609f2a558485331817d1031521fe845494253acd3cdb6d
                                                                                    • Instruction ID: 9d926bde3497d3a3371b77ea12b0fb76e1a34730dc86fc67dd60e8615cecfe53
                                                                                    • Opcode Fuzzy Hash: 893e0c766cdfdd3461609f2a558485331817d1031521fe845494253acd3cdb6d
                                                                                    • Instruction Fuzzy Hash: 1B615C72604A8086E761CF6AE4443AEB3A1F789FD8F444125EF8957B68DF79C489CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientShow$Screen$Rect
                                                                                    • String ID:
                                                                                    • API String ID: 4033864348-0
                                                                                    • Opcode ID: 82c66f738b9c41a2d33d2497e02259bb66c8bcd59079c4847bd791c22aabd92b
                                                                                    • Instruction ID: 1976d155ac8d099234ee3f07ae942c047681902390d94a75db932e77025a7aee
                                                                                    • Opcode Fuzzy Hash: 82c66f738b9c41a2d33d2497e02259bb66c8bcd59079c4847bd791c22aabd92b
                                                                                    • Instruction Fuzzy Hash: AF7128762056C4CADB11CF26E48439E7BB1F388F98F180125EB465BB68CF7AD585CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderMenuWindows$HookInfoLocationSpecial$ClassCreateCurrentCursorDesktopDestroyDirectoryFileFromItemListMessagePathPopupRegisterSendThreadTrackUnhookWindowlstrlen
                                                                                    • String ID: 1
                                                                                    • API String ID: 1986443932-2212294583
                                                                                    • Opcode ID: 017e1fcdb5041dea43e4e5ef5ca760f41a045f45972e04e04561bb667492bedf
                                                                                    • Instruction ID: 4a34fb743099f5c0d21492d07469bf26186d2e4b10e55b7b02df0579b31d6d60
                                                                                    • Opcode Fuzzy Hash: 017e1fcdb5041dea43e4e5ef5ca760f41a045f45972e04e04561bb667492bedf
                                                                                    • Instruction Fuzzy Hash: D8616D32200B8196E7A9DB22E590BDDB3A5F38CBC4F444016EF9947B64DFB9C4A4D780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSendShow$AsyncFocusKillStateTimer$ClientCursorParentScreenText
                                                                                    • String ID:
                                                                                    • API String ID: 1093764380-0
                                                                                    • Opcode ID: 37ebd5f6e52e66a54b59bbc2f7ff1f2532833614a27d4f5e2fa0e94b20c9e92b
                                                                                    • Instruction ID: 6805c90a65e38899544e8c03b055e5b4624535c23f5bf62ab5c369371d14bfbe
                                                                                    • Opcode Fuzzy Hash: 37ebd5f6e52e66a54b59bbc2f7ff1f2532833614a27d4f5e2fa0e94b20c9e92b
                                                                                    • Instruction Fuzzy Hash: 5B518E32304A8082EB66EB63D9503EA7361F78CBD5F444026EB8E47AB5CF39DD958740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ParentWindow$FocusKillRectShowTimer
                                                                                    • String ID: 0$n$z
                                                                                    • API String ID: 67215063-1260578908
                                                                                    • Opcode ID: ad2fa97399c74bd8e148a163742bb3981c4192edaa37dd00953432776324da9c
                                                                                    • Instruction ID: 353916c933dbeb335ca23472a2ee22bd995c05d693e285e5e6657473a8f6f8bf
                                                                                    • Opcode Fuzzy Hash: ad2fa97399c74bd8e148a163742bb3981c4192edaa37dd00953432776324da9c
                                                                                    • Instruction Fuzzy Hash: 9A516F32205B8492EB56CF27E5403DD73A0F38CBC0F18452AEB5A47BA4CF78C9958740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientRectScreen$ClipColorExcludeMessageOffsetParentPointsProcSend
                                                                                    • String ID: @@@
                                                                                    • API String ID: 2202115610-159275591
                                                                                    • Opcode ID: a8ba20d67e2554cb8f7e019cc5a408e0be371603667b6fe64e080c7b47ba407f
                                                                                    • Instruction ID: cfd89bdcf9b9de1506be96823bbc52b926521566db7552c5b4f4f4d4a564549d
                                                                                    • Opcode Fuzzy Hash: a8ba20d67e2554cb8f7e019cc5a408e0be371603667b6fe64e080c7b47ba407f
                                                                                    • Instruction Fuzzy Hash: 81515E76604B8486E761CF27E84079EB761F388FC0F444116EB9A4BBA9CF3AD455CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectStock
                                                                                    • String ID: (
                                                                                    • API String ID: 3428563643-3887548279
                                                                                    • Opcode ID: dbfb32c48899aaefe43eaba97014cafc6b24533e1e6f2073b3d9948d7bb9592a
                                                                                    • Instruction ID: 5c754f1ce86fb98e8e9def602d4d805f5c7ee26293241d6fdc1ebd05c272f42c
                                                                                    • Opcode Fuzzy Hash: dbfb32c48899aaefe43eaba97014cafc6b24533e1e6f2073b3d9948d7bb9592a
                                                                                    • Instruction Fuzzy Hash: 86412176206B408AEB529B62E8543AA77A0FB4DBC5F484025EF4E4B764DF7DC844CB41
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Client$Screen$Rect$Show
                                                                                    • String ID: \
                                                                                    • API String ID: 246452983-2967466578
                                                                                    • Opcode ID: d47420ffb9c6a9e4f20d59f050cefa3e15003d7d6e67e64eaf7e1f1bf76f9deb
                                                                                    • Instruction ID: f665aa084009d26088d94018eddfa345193660b9efb92d92c2f5957e8de33296
                                                                                    • Opcode Fuzzy Hash: d47420ffb9c6a9e4f20d59f050cefa3e15003d7d6e67e64eaf7e1f1bf76f9deb
                                                                                    • Instruction Fuzzy Hash: 5F51B076214B848AD711CF2AE48865EBBB5F38CB94F184125EB8947B28CF3AD945CF40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMessageSendWindow$EnableHandleImageLoadModuleShow
                                                                                    • String ID: shell32
                                                                                    • API String ID: 3276235772-4179111565
                                                                                    • Opcode ID: 278e41ecb9c5394f1e9cccd109cb03c186a636365eca5ddfe4908873fb1d45fe
                                                                                    • Instruction ID: 04ea4c2bb814a5d63896c709fb182604e0ea412f879f4aac82f426d9a495bdd1
                                                                                    • Opcode Fuzzy Hash: 278e41ecb9c5394f1e9cccd109cb03c186a636365eca5ddfe4908873fb1d45fe
                                                                                    • Instruction Fuzzy Hash: AE318F3230068082EB669B27F85479A7761F78DFE5F0842259F6A1BBB5CF3DC4868700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$Version$_cwprintf_s_l
                                                                                    • String ID: Unbekannt $ Win32 NT $ Win32 WINDOWS$ Win32s$Windows %d.%d
                                                                                    • API String ID: 186566674-1665667020
                                                                                    • Opcode ID: 7ac9d5a7afde2f0ab05f418263c8f16b336959beaec5b9c1beb767fe6be93ec7
                                                                                    • Instruction ID: a7870134e7f6aaab7ce6c1545d93f9d4c2554553abfe56dcda2b0a86a282c088
                                                                                    • Opcode Fuzzy Hash: 7ac9d5a7afde2f0ab05f418263c8f16b336959beaec5b9c1beb767fe6be93ec7
                                                                                    • Instruction Fuzzy Hash: B741CE74220E059AFB57DB1BEC453E437B1B75DB86F880451EB0A6B2B0DB3AC848CB51
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientGlobalKillRectTimer$#190FolderFreeLocationShowSpecialUnlockWindow
                                                                                    • String ID:
                                                                                    • API String ID: 296821359-0
                                                                                    • Opcode ID: f5d0d520823314f4caf08c963358c158c66f2b9a780af6c20416ee76c4d95752
                                                                                    • Instruction ID: 3652137149b15181d2ea5413d4dbcb7718f1dd4f1004878e16fc513910652855
                                                                                    • Opcode Fuzzy Hash: f5d0d520823314f4caf08c963358c158c66f2b9a780af6c20416ee76c4d95752
                                                                                    • Instruction Fuzzy Hash: B18149B2315A4182FB66DB26F8547AA63A0F78CFD8F084121EB5A476B5DF3DC449C704
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ItemTextWindowlstrlen$_cwprintf_s_l
                                                                                    • String ID: %s\%s
                                                                                    • API String ID: 4093046438-4073750446
                                                                                    • Opcode ID: 68f6d6e936142cc6abd4d8e24d6dd9447a291e48de21addc7d95c0bade4a9985
                                                                                    • Instruction ID: 53bbeb9e5caabb3b8c04ebf1d86b7c83d5c5240be59d6a0cb739a061037817ca
                                                                                    • Opcode Fuzzy Hash: 68f6d6e936142cc6abd4d8e24d6dd9447a291e48de21addc7d95c0bade4a9985
                                                                                    • Instruction Fuzzy Hash: C4814F72214A8182EA52DB26E8903E97360F789BF0F544322AB7E87BF5DF38C445C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$BitsDeleteGdip$AllocBitmapCreateFromIconInfoReleaseScan0
                                                                                    • String ID: &
                                                                                    • API String ID: 1474606373-3042966939
                                                                                    • Opcode ID: efd7b6a0251c5f25296dd131fd042078232bfbe72c4c06099bde3b84839c1c43
                                                                                    • Instruction ID: 48cc2c82cc5d401a9a212c694a46ec3a892dad168c173f5bb63c627ab31c3f48
                                                                                    • Opcode Fuzzy Hash: efd7b6a0251c5f25296dd131fd042078232bfbe72c4c06099bde3b84839c1c43
                                                                                    • Instruction Fuzzy Hash: 78517D36214B808AE726CF26E54079EB7A1F78DBC4F484125EB8A4BB69DF3DC455CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ColorRegisterWindow$AddressClassCreateDragDropHandleLibraryLoadLongModuleProc
                                                                                    • String ID: NotifyWnd$P$explorer
                                                                                    • API String ID: 4162847491-2394816450
                                                                                    • Opcode ID: 072f3490385f1b08bd3957999a245e8133dcb9d59dc5d89f484f6012cf92940e
                                                                                    • Instruction ID: 75ff469e65e1dbaa82315562281a00d6aea1b4f115567bc715d4e1351d8ff632
                                                                                    • Opcode Fuzzy Hash: 072f3490385f1b08bd3957999a245e8133dcb9d59dc5d89f484f6012cf92940e
                                                                                    • Instruction Fuzzy Hash: 5E517B72314B81DBEB19DF22E5547DAB3A0F388B99F404015EB8907AA5DF79D468CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Resource$AddressFreeLockProcUnlock$AllocCreateFindLoadSizeofStream
                                                                                    • String ID: GdipLoadImageFromStream
                                                                                    • API String ID: 3915296160-1836631380
                                                                                    • Opcode ID: 4743f0a83db7852f490e38e269407323609c48114d59ec4f22f2ab552ca190ed
                                                                                    • Instruction ID: 6b3c03ebe510526f4041e7fd4005190226d5dcb4b2b80ebea02d67574c264f35
                                                                                    • Opcode Fuzzy Hash: 4743f0a83db7852f490e38e269407323609c48114d59ec4f22f2ab552ca190ed
                                                                                    • Instruction Fuzzy Hash: 9031DD71605B4181EA669B23E8543A973A0FB8CFC4F488429DF4A4B769EF39C545C354
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Image$List_$IconLoadReplace$CreateHandleItemMessageModuleSend
                                                                                    • String ID: shell32.dll
                                                                                    • API String ID: 1514679979-3366042328
                                                                                    • Opcode ID: 9a1caa2c96ad7bd751b2a0529b9ac9fa9cd7bbd283ff4223c960c49a5efe6c2c
                                                                                    • Instruction ID: a8002d649c5a56b799ffe6446cb70a10a431a5f148db1ed63a867d4b65364dfb
                                                                                    • Opcode Fuzzy Hash: 9a1caa2c96ad7bd751b2a0529b9ac9fa9cd7bbd283ff4223c960c49a5efe6c2c
                                                                                    • Instruction Fuzzy Hash: CB312735200B8082E711AB23E85879A77A4F78CFE9F140115EA9A0BBB4CF7EC449CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: RectWindow$CaptureInvalidateLong$Cursor$ClassClientCreateDestroyFocusMessageNameObjectParentReleaseScreenSendStockUpdatelstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 3150403950-0
                                                                                    • Opcode ID: c4ee1c578c7f47e4fbfbe921c45e571604ae03fc4b7d35570336eea197aea935
                                                                                    • Instruction ID: 3d45684839cdca5c2181369342152f05ee2739737828f72ae546f52ec848db28
                                                                                    • Opcode Fuzzy Hash: c4ee1c578c7f47e4fbfbe921c45e571604ae03fc4b7d35570336eea197aea935
                                                                                    • Instruction Fuzzy Hash: 8E915BB2A14A8185EB72DF66F4803EE73A5F389BD4F584022EB89576B5CF38C845C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rect$ClientLongParent$InfoParametersPointsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2289592163-0
                                                                                    • Opcode ID: e78856af9152c24a87f141017bd36f2d3bad89628bb575f646988a1160544266
                                                                                    • Instruction ID: 312306d3f7eb7005132e0c3f4ef1c4776f6e8c197fce6b373ac1fd4fb78c43b8
                                                                                    • Opcode Fuzzy Hash: e78856af9152c24a87f141017bd36f2d3bad89628bb575f646988a1160544266
                                                                                    • Instruction Fuzzy Hash: 7E418D72324A4186E712CF3AF94879EB761F78CBD0F644110EB9987AA8CF39D804CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$ClassLoadRegister$ErrorLast$CriticalCursorFindGlobalInfoLockMessageSectionWindow$DialogEnterFreeHandleIndirectLeaveParam
                                                                                    • String ID:
                                                                                    • API String ID: 2053837155-0
                                                                                    • Opcode ID: 26e1dacd03aafd8c8a5985d5030c6c63c1e9a6c34976afdf96c758388c2a00d7
                                                                                    • Instruction ID: 8a021db920f6b76a2838fe1e7d6fe08826e6cb4fe3829f216fbd3e5b12316500
                                                                                    • Opcode Fuzzy Hash: 26e1dacd03aafd8c8a5985d5030c6c63c1e9a6c34976afdf96c758388c2a00d7
                                                                                    • Instruction Fuzzy Hash: EE314B34311B5186EE569B63A808799B7E1BB4DFE4F080624AF2E0B7F5DE3ED8458340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Send$lstrlen
                                                                                    • String ID: 0
                                                                                    • API String ID: 3731344635-4108050209
                                                                                    • Opcode ID: 1c0c79508f9db68edd305f4970a7c45edc0dd75714934a35244da955ed481589
                                                                                    • Instruction ID: eb63377bd6780249ed3a6118032bcf46eb7a9b29496cd68f2a442a2cbc5651e3
                                                                                    • Opcode Fuzzy Hash: 1c0c79508f9db68edd305f4970a7c45edc0dd75714934a35244da955ed481589
                                                                                    • Instruction Fuzzy Hash: 8891CF32304A8082FBA28B67E8543D97360F799BD0F14422AAB5947AF5DF7DCCC58741
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$CreateFontIndirect$DeleteInfoParametersStockSystemlstrcpyn
                                                                                    • String ID: FontFaceName$Start
                                                                                    • API String ID: 3063546216-3130205924
                                                                                    • Opcode ID: c6e1499cfb9564bb87d0e889e4a3538c7a7504f1bc9edd6da0c40f8a7d3fc47a
                                                                                    • Instruction ID: 1335b930583471c401568da85460d81441081d594d8bf66777c56c906804ed68
                                                                                    • Opcode Fuzzy Hash: c6e1499cfb9564bb87d0e889e4a3538c7a7504f1bc9edd6da0c40f8a7d3fc47a
                                                                                    • Instruction Fuzzy Hash: 69816272204A8086EB62DB26F4503DAB7A1F78DB90F544225EB9D476B9DF3CC544CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Send$Focus$#155ShowWindow
                                                                                    • String ID: o
                                                                                    • API String ID: 2215054203-252678980
                                                                                    • Opcode ID: 94a81325d3e9a3dd52085e5951d4ef5b73bf1f2d353f4957e86eb7ed04f8b1f8
                                                                                    • Instruction ID: f360dae6c34f02a1a50e69c9ca832809ff607a5ede2e33d9de8455e465023ea0
                                                                                    • Opcode Fuzzy Hash: 94a81325d3e9a3dd52085e5951d4ef5b73bf1f2d353f4957e86eb7ed04f8b1f8
                                                                                    • Instruction Fuzzy Hash: C7715C72210A4182EB629B67E8507DA6360F7D8BF4F444312AB6E47AF5CF7CC881C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: GdipCreateFromHDC$GdipCreateImageAttributes$GdipDeleteGraphics$GdipDrawImageRectRectI$GdipSetImageAttributesColorMatrix
                                                                                    • API String ID: 190572456-226930721
                                                                                    • Opcode ID: ec020341f3fd1c9a219bf9e339275d5b6ec1268e70b2c8aff49a7e354ba13650
                                                                                    • Instruction ID: d79905fdd51cec85347cc80a3e93e2b177e4b0c056a36e1656d9055f5e08d980
                                                                                    • Opcode Fuzzy Hash: ec020341f3fd1c9a219bf9e339275d5b6ec1268e70b2c8aff49a7e354ba13650
                                                                                    • Instruction Fuzzy Hash: 0681E732515F819AE671CF13E8807AAB3B0F7DDB90F14521AEB8946678DF78C490DB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseItemMessageSend$DeleteDialogExecuteFileModuleNameOpenShell_cwprintf_s_l
                                                                                    • String ID: RegisterAdminKey4_EEETWETRFSD=%d$runas
                                                                                    • API String ID: 1829791887-816592029
                                                                                    • Opcode ID: e372da56c28a990fbb92f7d819f175b5be815f8c1b7e09dd1fcf64c85f84d74b
                                                                                    • Instruction ID: 4334877fde328765f94068981d195eae6652ff7aec441a5f90725909425142f0
                                                                                    • Opcode Fuzzy Hash: e372da56c28a990fbb92f7d819f175b5be815f8c1b7e09dd1fcf64c85f84d74b
                                                                                    • Instruction Fuzzy Hash: CB517432305A8182F762DF66E8913D973A0F78CBA4F584225E7698BAF5DF39C845C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Class$CriticalInfoSection$Leave$CursorEnterLoadRegister
                                                                                    • String ID: ATL:%p$P
                                                                                    • API String ID: 269841140-2635742592
                                                                                    • Opcode ID: 7135ce2e13eeb8f1b9f4bcc9cc07b40e4abefb95b85b1c23abd4ab857eedd00b
                                                                                    • Instruction ID: 5c11983778a0ab81b461f75c5dd45ad7feddb2b90970f6c6fe026f4118fcad2c
                                                                                    • Opcode Fuzzy Hash: 7135ce2e13eeb8f1b9f4bcc9cc07b40e4abefb95b85b1c23abd4ab857eedd00b
                                                                                    • Instruction Fuzzy Hash: 26518A76200B80A3EA25DB23E5443DD33A0F389BC0F444612EF5A4BBA4CB7AD5A5C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClassCreateFolderHandleLocationLongModuleRegisterShowSpecial
                                                                                    • String ID: NotifyWnd_123$P
                                                                                    • API String ID: 299184763-2082992119
                                                                                    • Opcode ID: 1d53f2cbd94e36df47257f48112cbb351e0baf55650e9ff48d23cdca450d3295
                                                                                    • Instruction ID: 6e4335584d0a11d185457a98343a665f84a6d97a261aeb1d3196329f68ad3c39
                                                                                    • Opcode Fuzzy Hash: 1d53f2cbd94e36df47257f48112cbb351e0baf55650e9ff48d23cdca450d3295
                                                                                    • Instruction Fuzzy Hash: 57415E32614B8087F765CF22E44839EB3A0F78CB99F540119EB894BAA8CF7EC155CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcat$lstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 751011610-0
                                                                                    • Opcode ID: 2c46cecf6dd1d1aeaeca04e78982a9fbe33ca1ac9120f1a51e7d7d4f4d1fd1c9
                                                                                    • Instruction ID: a6d428bd347c04e7a3eb1a91d8404619ce07dde4f06cd20341777a9d9b1d3f47
                                                                                    • Opcode Fuzzy Hash: 2c46cecf6dd1d1aeaeca04e78982a9fbe33ca1ac9120f1a51e7d7d4f4d1fd1c9
                                                                                    • Instruction Fuzzy Hash: BC514EB130064189DF669F22E9543A973A2FB1CBD4F488022DF46AB374EB7DC490C344
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance
                                                                                    • String ID: {
                                                                                    • API String ID: 542301482-366298937
                                                                                    • Opcode ID: 6bd7c3035b2f1fec2c520c9da2092109bdcf0cc699e1576e10d92db8021fd3a6
                                                                                    • Instruction ID: e2cddfe4c8c8dd64bed88e1f857c62dc5917b2c5f16a611aa439516e0512c65a
                                                                                    • Opcode Fuzzy Hash: 6bd7c3035b2f1fec2c520c9da2092109bdcf0cc699e1576e10d92db8021fd3a6
                                                                                    • Instruction Fuzzy Hash: 4D51743260464181EB629F2AE844BD973B1F38CB98F588112FB5A4B6B4DB7AC586C700
                                                                                    APIs
                                                                                    • FindResourceW.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 000000014008401B
                                                                                    • LoadResource.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 000000014008402A
                                                                                    • LockResource.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 0000000140084033
                                                                                    • SizeofResource.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 0000000140084042
                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 00000001400840C8
                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 00000001400840E9
                                                                                    • FreeResource.KERNEL32(?,?,?,00000000,00000000,000000014008468A), ref: 0000000140084105
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$lstrlen$FindFreeLoadLockSizeof
                                                                                    • String ID: IMG$p
                                                                                    • API String ID: 3332429121-1219239123
                                                                                    • Opcode ID: dc1794f371df491982d42308c46714979876dd8f28c65607bb525849b9d121ff
                                                                                    • Instruction ID: 95d36bdf9983765ff8fba5d12307b46627a2d1bef3768e68c3930ddb0e036328
                                                                                    • Opcode Fuzzy Hash: dc1794f371df491982d42308c46714979876dd8f28c65607bb525849b9d121ff
                                                                                    • Instruction Fuzzy Hash: 1D514D76218AC08AD761EB26F8443DAB7A5F7CCB94F444215EB9D83BA9DF38C454CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Parent$ClientCursorScreen
                                                                                    • String ID: 0
                                                                                    • API String ID: 3424710631-4108050209
                                                                                    • Opcode ID: 6972e0b8af878e675b3cba79eeed6a12daec459d72d18f05386f1dda4083b506
                                                                                    • Instruction ID: b08a569aa33570b1f3eb60ac203390e3ace8c55b3d1c2544c6414936085219ec
                                                                                    • Opcode Fuzzy Hash: 6972e0b8af878e675b3cba79eeed6a12daec459d72d18f05386f1dda4083b506
                                                                                    • Instruction Fuzzy Hash: 9B312F72214A8482E761DF22E4547DE73A1F78CF89F484016EB8D4BAA8CF3DC949CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Ctrl$Parent$ExecuteInvalidateMessageRectSendShell
                                                                                    • String ID: open
                                                                                    • API String ID: 1200564152-2758837156
                                                                                    • Opcode ID: 518eda953508c50585776ef5b8d8172c329e54e578ab125f7fbe16511b086925
                                                                                    • Instruction ID: bdd8e8cff3ba433485ce1aaed6632ce3e642ae7ee45adf98f839c4fb0c243799
                                                                                    • Opcode Fuzzy Hash: 518eda953508c50585776ef5b8d8172c329e54e578ab125f7fbe16511b086925
                                                                                    • Instruction Fuzzy Hash: F4215C36204B8083E725CB22F8953A9B761F78DBD5F084526EB9A4BB64CF3AD465C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LineObject$DeleteSelect$CreateMove
                                                                                    • String ID:
                                                                                    • API String ID: 942295950-0
                                                                                    • Opcode ID: 8905afc1c0ad8fed279197ddca2ebb14e51d8cef65e504ca11912654cb231f72
                                                                                    • Instruction ID: dafebe9fe28e3f16b7396be985a0e8fda7e01714ea8ec3aa6c9759547280ec70
                                                                                    • Opcode Fuzzy Hash: 8905afc1c0ad8fed279197ddca2ebb14e51d8cef65e504ca11912654cb231f72
                                                                                    • Instruction Fuzzy Hash: 5A21963A710A808BD7559F23E95479AB761F78DFD4F188015EF5A0BB28CF39E4458B80
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: _cwprintf_s_l$AddressLibraryLoadMessageProclstrlen
                                                                                    • String ID: $--$%d c2:%d$%d.) %s : %s
                                                                                    • API String ID: 2498098824-883129594
                                                                                    • Opcode ID: 70e4913d2d89bd3880ad882b7e21b25d7f954f37d94998cd494a27b14dc6733a
                                                                                    • Instruction ID: 1662987e0f51c3c27642f526c6c655dd5087fd7a4b320527f6e57c0d40f780c9
                                                                                    • Opcode Fuzzy Hash: 70e4913d2d89bd3880ad882b7e21b25d7f954f37d94998cd494a27b14dc6733a
                                                                                    • Instruction Fuzzy Hash: 9EE17072305A8082EA52CB7AE8517D963A1F789BF4F444312EB6E976F5DF38C445CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ImageMessageSend$ClientCreateCtrlFindInfoInstanceList_RectWindow
                                                                                    • String ID: SysTreeView32
                                                                                    • API String ID: 3498475682-1698111956
                                                                                    • Opcode ID: b40857ce68eca97ac279472ae2654539bca499f7acb29a13780fa7775b3860a5
                                                                                    • Instruction ID: b967fff96086e11505ed5890c6433bfeb092e69e14d3da72218f5800dead6df7
                                                                                    • Opcode Fuzzy Hash: b40857ce68eca97ac279472ae2654539bca499f7acb29a13780fa7775b3860a5
                                                                                    • Instruction Fuzzy Hash: E7812576210B8486DB65DF26E8847DE73A5F388B80F548922DBAE47B64DF39D885C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$CloseOpenQueryValue
                                                                                    • String ID: Content Type$application/unknown
                                                                                    • API String ID: 2304643261-1085911772
                                                                                    • Opcode ID: 729a1a9da6d946ea1f34177d70679dbff31b99967a0bb983a2b847bf8bd67fac
                                                                                    • Instruction ID: 7d05fe7c52b983f75d58c2bb761ad57d65d29fbc042a1f479a0e2f95defb6702
                                                                                    • Opcode Fuzzy Hash: 729a1a9da6d946ea1f34177d70679dbff31b99967a0bb983a2b847bf8bd67fac
                                                                                    • Instruction Fuzzy Hash: DE716C36211A4096EB529F66E8803DA63A0F788BE4F448225FB6E477F6DF38C455CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$BrowseFolderFromListMallocMessagePath
                                                                                    • String ID: Failed to get directory$Verzeichnisauswahl / Select a directory:
                                                                                    • API String ID: 611531059-3768070435
                                                                                    • Opcode ID: e5d83f78b5bc466dd82e8a16b2694b29347c46f22ebacb69bd1f815ada073fac
                                                                                    • Instruction ID: 70b6ff1d12bcbbf4c6862068cb43ef99f1d53f3ccfea9ca737139f6557321e0e
                                                                                    • Opcode Fuzzy Hash: e5d83f78b5bc466dd82e8a16b2694b29347c46f22ebacb69bd1f815ada073fac
                                                                                    • Instruction Fuzzy Hash: 4D615032211A4086E756EB3AE8953A923A0FB8CFB4F544711DB6F8B6F4DF39C4558740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Info$AppendItem$Filelstrcpynlstrlen
                                                                                    • String ID: 1$H$d
                                                                                    • API String ID: 3659072720-2962081501
                                                                                    • Opcode ID: 89560908aa01e2190ba77cccb70d0fdca5208bb7476d50e5c641b9a2ece68469
                                                                                    • Instruction ID: fc02280e636dd2d6a70bd4ec8c3b7a2432faa55408951c49149887ab4ccf56cf
                                                                                    • Opcode Fuzzy Hash: 89560908aa01e2190ba77cccb70d0fdca5208bb7476d50e5c641b9a2ece68469
                                                                                    • Instruction Fuzzy Hash: 5331C372214A8082E762DB26E8547CAB3A0F7CDBE4F445225BB6A47AF5CF7CC505CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ClientScreen$Cursor
                                                                                    • String ID: o
                                                                                    • API String ID: 2946236063-252678980
                                                                                    • Opcode ID: ef7565315ca815afcddbb04c803b954a53bf61e154ffe7df45128ba5cbdcb52e
                                                                                    • Instruction ID: 45a8256c60a5a16804508c6eb6fde6f4c1b61692bd0d3b56c2c541f91f8d4270
                                                                                    • Opcode Fuzzy Hash: ef7565315ca815afcddbb04c803b954a53bf61e154ffe7df45128ba5cbdcb52e
                                                                                    • Instruction Fuzzy Hash: C3413B36214A8583EB65CB22E4547DEB3A0F78CFD5F448122EB5A0BB68DF79C555CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$FocusFolderLocationMessageRedrawSendShowSpecialUpdate
                                                                                    • String ID: p
                                                                                    • API String ID: 1076984956-2181537457
                                                                                    • Opcode ID: 266f0b2ab112205f0fbbeebdebc48049461b818aec0bb42451ce944bca3b1aed
                                                                                    • Instruction ID: 9eb0a05253ee0a9591f03b78a0303ee2663ee33ba0746f13fc5c789fc2b9bbd8
                                                                                    • Opcode Fuzzy Hash: 266f0b2ab112205f0fbbeebdebc48049461b818aec0bb42451ce944bca3b1aed
                                                                                    • Instruction Fuzzy Hash: DB318D72300A8087E718DF67E95478EB761F78CBA0F448225DBAA47BA4CF39D465CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseValue$DeleteOpenTimetime
                                                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion$_________ADMIN_TEST_SoftwareOK
                                                                                    • API String ID: 1042658670-3312681302
                                                                                    • Opcode ID: b57ef26c7f9f59886a9f6bd09978b25a63e142dadbd2d67efb49e61e1def9bfc
                                                                                    • Instruction ID: 93d4eb29420f7a8397024a88b39a01418e1dcb35781e1373d50b23cd77d437aa
                                                                                    • Opcode Fuzzy Hash: b57ef26c7f9f59886a9f6bd09978b25a63e142dadbd2d67efb49e61e1def9bfc
                                                                                    • Instruction Fuzzy Hash: D52151B1610B0186FB528B26F844BE973A4F75DB95F980130EB494B6B4EB3DC188CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Folder$LocationSpecial$Version$Concurrency::details::stl_critical_section_win7::stl_critical_section_win7CreateCriticalDeleteDesktopFontIndirectInitializeObjectSectionSettings
                                                                                    • String ID:
                                                                                    • API String ID: 4159206225-0
                                                                                    • Opcode ID: a799804ddf88ae58d7e28c15e9a88a2b400b0d6743f4b1ee47025bf93db21a22
                                                                                    • Instruction ID: 6f3ffeec9e0406492a276f117b0f5e0e68a6d5468a7e380ec3e4171c25c19210
                                                                                    • Opcode Fuzzy Hash: a799804ddf88ae58d7e28c15e9a88a2b400b0d6743f4b1ee47025bf93db21a22
                                                                                    • Instruction Fuzzy Hash: 2C810872201B8087E769CF26F8947DEB7A8F749BA4F504219DBEA076A0DF39D055CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0b1fc83b9c300319994002453ff1fbeaf10af7aacc190cdf1e5edf7319907a13
                                                                                    • Instruction ID: 8902ad8abcf953dfc7f8d0c16a0b02d7ea7967f02e6f9919dd1262025804e2a8
                                                                                    • Opcode Fuzzy Hash: 0b1fc83b9c300319994002453ff1fbeaf10af7aacc190cdf1e5edf7319907a13
                                                                                    • Instruction Fuzzy Hash: 7B312732614B40C6EB669B26E41439963E0FB8CFC5F084015EF8A0F768DF7AD505C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrlen$DrivesLogical
                                                                                    • String ID: 0
                                                                                    • API String ID: 1932446174-4108050209
                                                                                    • Opcode ID: 592ac17d05d446328c3688e30ddf1153552348c05069813c25ede8053c76e5e4
                                                                                    • Instruction ID: e856c5174a01106574392260ac54b9b31cd9196cc3e436c50abd4262a28f5b2a
                                                                                    • Opcode Fuzzy Hash: 592ac17d05d446328c3688e30ddf1153552348c05069813c25ede8053c76e5e4
                                                                                    • Instruction Fuzzy Hash: 8771A132204A8096E762DF26E8407DE77A0F788BA4F444226EB9D47AF5DF3CC549CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendlstrlen$Windowlstrcpy
                                                                                    • String ID: H
                                                                                    • API String ID: 3084890318-2852464175
                                                                                    • Opcode ID: 998fd3e03e9546dc5ce73377d0c6faa6de96efd626bce2f7390d205c5cf8eea9
                                                                                    • Instruction ID: 00dc3f2accd2afacbe5e53b625b80bfc19200b543686506839eeae09b77daa82
                                                                                    • Opcode Fuzzy Hash: 998fd3e03e9546dc5ce73377d0c6faa6de96efd626bce2f7390d205c5cf8eea9
                                                                                    • Instruction Fuzzy Hash: 2D417072214B8082EA65DB26F9443A973A0F78CBE0F044224EF994BBA4CF39D465C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Unlock$ClipboardFormatFreeLockMediumRegisterRelease
                                                                                    • String ID: Shell IDList Array
                                                                                    • API String ID: 660139674-4184189358
                                                                                    • Opcode ID: d9502714cfd4eeb025a438ff4370efde520d43677dca64ecf7438b66c26511cb
                                                                                    • Instruction ID: d4b21c7c341ee0f96bc615b554f6c755829edfc16a3668a57fc3daebf2462da3
                                                                                    • Opcode Fuzzy Hash: d9502714cfd4eeb025a438ff4370efde520d43677dca64ecf7438b66c26511cb
                                                                                    • Instruction Fuzzy Hash: D031F3B2204A4186EB52CB26E88439967B0FB8CBD4F144125EB8A87674DF3DC554CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Focus$DebugOutputString
                                                                                    • String ID: fffff
                                                                                    • API String ID: 3720455092-4168676731
                                                                                    • Opcode ID: d87b18b21f16af6a7ec6c76fb937ac97ee716c7bf0c7f15d98149f5f35deb68e
                                                                                    • Instruction ID: 06b651e80687653329116ea51fc719b0f8f11fc327404b097ad18aa9ec196e5c
                                                                                    • Opcode Fuzzy Hash: d87b18b21f16af6a7ec6c76fb937ac97ee716c7bf0c7f15d98149f5f35deb68e
                                                                                    • Instruction Fuzzy Hash: 93011D3171154182EB518F72F859BE93360E79DF8AF4C50218F0A0FA70DF3AC44A8740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Timer$CurrentExceptionKillRaiseThread
                                                                                    • String ID:
                                                                                    • API String ID: 3847418034-0
                                                                                    • Opcode ID: 68dc1cbe0aa24f5a72b5a5f84de792b169ec02f3503486e96eca1d02fefaeae8
                                                                                    • Instruction ID: b550e88aca2e2971f9cabf041bfae2363234ac33b535199f5b93c579eccb6f49
                                                                                    • Opcode Fuzzy Hash: 68dc1cbe0aa24f5a72b5a5f84de792b169ec02f3503486e96eca1d02fefaeae8
                                                                                    • Instruction Fuzzy Hash: A2414B32310B4082EB658B27E4947A973A5F788FD5F548129EF5E4BBA5CF39C8858700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance
                                                                                    • String ID:
                                                                                    • API String ID: 542301482-0
                                                                                    • Opcode ID: 0b51c8b527ad2f00af57ab81d83cb1fae91b659708fd774fc8f7d48fba9401a9
                                                                                    • Instruction ID: 30c3a11663207b04ce095c9100f30b01413de14057cc9cfd9d68442222aacb3b
                                                                                    • Opcode Fuzzy Hash: 0b51c8b527ad2f00af57ab81d83cb1fae91b659708fd774fc8f7d48fba9401a9
                                                                                    • Instruction Fuzzy Hash: 88413572214B4492EB22DF26E8503D973B0F789F95F544122DB8E4B6B8DF39C989C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$FocusMessageSendShow$TextTimer
                                                                                    • String ID:
                                                                                    • API String ID: 1913100717-0
                                                                                    • Opcode ID: de8d7ff7c91b498aabb582babbec0c5d97a4d4816c88dcba63e197aca167ba28
                                                                                    • Instruction ID: c75126f2db7df582280ac30466f0de8ea6cd3c0ad971bec71a96c073e1f00cd0
                                                                                    • Opcode Fuzzy Hash: de8d7ff7c91b498aabb582babbec0c5d97a4d4816c88dcba63e197aca167ba28
                                                                                    • Instruction Fuzzy Hash: 83312B36200A8182E752DF76E8507D97362F7C8BF8F5842229F694BAE8CF39C945C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$KillTimer
                                                                                    • String ID:
                                                                                    • API String ID: 1116794301-0
                                                                                    • Opcode ID: e45ad180756f6a66daf05634541f668884d209b0447e005d31019f26e81111e8
                                                                                    • Instruction ID: 1bab376f7a794c7d31a38753163fbee1d4bf8b7147017290e8f01d4ca8160433
                                                                                    • Opcode Fuzzy Hash: e45ad180756f6a66daf05634541f668884d209b0447e005d31019f26e81111e8
                                                                                    • Instruction Fuzzy Hash: 30211C35201A8082EB919FB7E85479D6361E7CDFDAF5890319F4A5BBA8DE38C8858350
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeTask_cwprintf_s_llstrlen$AddressByteCharLibraryLoadMultiProcWide
                                                                                    • String ID: %s,%d;$ViewMode,%d;ImageSize,%d;FolderFlags,%d;GroupBy,%s;Group,%d;
                                                                                    • API String ID: 1249642529-1631008325
                                                                                    • Opcode ID: 203c4573784517ce03fd3c447d22a9bbf788c9fd543a52949406ede2e60a0183
                                                                                    • Instruction ID: 9ab6454bb757e8da9094741ec634296485af00c7723aab5dd1c2fcc9ba6f4e5e
                                                                                    • Opcode Fuzzy Hash: 203c4573784517ce03fd3c447d22a9bbf788c9fd543a52949406ede2e60a0183
                                                                                    • Instruction Fuzzy Hash: 17C16172204A8086EA12DB2AE4403DEB7A1F7C9FE4F544212EB9D47BA9DF79C545CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocGlobalMessageSend
                                                                                    • String ID: g
                                                                                    • API String ID: 277534643-30677878
                                                                                    • Opcode ID: a3ede16d70b84d5b16f8be3e7eef29651660cf2209a86c703adac8cf844c0f0e
                                                                                    • Instruction ID: 58952fd4f6ce98fa664fcb414808b88aa69d7abdc39faae01a3d54ba6093df09
                                                                                    • Opcode Fuzzy Hash: a3ede16d70b84d5b16f8be3e7eef29651660cf2209a86c703adac8cf844c0f0e
                                                                                    • Instruction Fuzzy Hash: 5F416B72604B85C6EB61CF56E8447DAB3A1F38CF94F544226EBA943BA8CF39C545CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MenuPopup$CreateDesktopFolderMessageParentSendTrack
                                                                                    • String ID: 8
                                                                                    • API String ID: 4175632323-4194326291
                                                                                    • Opcode ID: 953e1428a459ef7c34fd10fe8bc78450de88d03029f7ffd9cdbf9f1594351eae
                                                                                    • Instruction ID: 6b4657662e0c15f174c5e52701b3c905c76491e72966aaa2a50895af07cd93e3
                                                                                    • Opcode Fuzzy Hash: 953e1428a459ef7c34fd10fe8bc78450de88d03029f7ffd9cdbf9f1594351eae
                                                                                    • Instruction Fuzzy Hash: C4510576314B8486EB618B26E49479AB7A0F789B89F548115EB8D4BB68CF7DC448CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Focus
                                                                                    • String ID:
                                                                                    • API String ID: 3982298024-0
                                                                                    • Opcode ID: f860ffe6d2140f2844f54cab0ca51870d3129242f74bd8ea73c5c69872e084bb
                                                                                    • Instruction ID: b610f388160f3f1a26fda727c0b36c87e76938eff2afb54359062850295804c1
                                                                                    • Opcode Fuzzy Hash: f860ffe6d2140f2844f54cab0ca51870d3129242f74bd8ea73c5c69872e084bb
                                                                                    • Instruction Fuzzy Hash: 5A419F31314A80C2FBA6AB62E8507DA7350F789BD5F488125AB594BEF5DF38CC95C704
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocTask
                                                                                    • String ID:
                                                                                    • API String ID: 277515162-0
                                                                                    • Opcode ID: 5e8679a3c84486a76ba3651a4798ff9ea1603562ef64feffcd663faec1f149ab
                                                                                    • Instruction ID: 2024940fa7bce86b04e29bd2d8e461a2552d7b48f24a366a49c5181144aec1d9
                                                                                    • Opcode Fuzzy Hash: 5e8679a3c84486a76ba3651a4798ff9ea1603562ef64feffcd663faec1f149ab
                                                                                    • Instruction Fuzzy Hash: 28319431200B8586FB569B67A4547D953B0EBCCBD4F184429BF4D8F7B5DE7AC8848380
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$CurrentEnterExceptionRaiseThread$Leave
                                                                                    • String ID:
                                                                                    • API String ID: 1900833728-0
                                                                                    • Opcode ID: ba634b300a653fc6c7866f7a959c155f4ccca22f17d11136a9290faf1b74e37b
                                                                                    • Instruction ID: aa2b480570dfd8a4a5ca896e549a89b7028c7b0db67c4808613ad90208e02cc4
                                                                                    • Opcode Fuzzy Hash: ba634b300a653fc6c7866f7a959c155f4ccca22f17d11136a9290faf1b74e37b
                                                                                    • Instruction Fuzzy Hash: E8318E72210B8182EBA5CF62F95079977A4FB4CBC4F485421EF9A07F64DF38D4A58740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Folder$LocationSpecial$DesktopDirectoryFileFromInfoListPathWindowslstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 3622127152-0
                                                                                    • Opcode ID: f31967b80806024e4af3f12ef5453d4f7bfbc6933549fb0c34b3948bf1d303ec
                                                                                    • Instruction ID: 5ec5ded693a50d538c3300387ca122cb75aea0257e626655050a9e7877038880
                                                                                    • Opcode Fuzzy Hash: f31967b80806024e4af3f12ef5453d4f7bfbc6933549fb0c34b3948bf1d303ec
                                                                                    • Instruction Fuzzy Hash: 75313872600B8586EB61DF26E4947DAB3A1F78CB84F844435DB8A87B79DF39D045C780
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CreateWindow
                                                                                    • String ID: 2$B$ComboBoxEx32$d
                                                                                    • API String ID: 2286652126-2739734601
                                                                                    • Opcode ID: 38eaeb23fb88a4f4eec0de346e90d652ca85c744b6c391e02b432fcefee57cb3
                                                                                    • Instruction ID: 437f6332de87a5facb4a58d3b39335fbcc2ef115efb4f6be8620e2d7ce48a668
                                                                                    • Opcode Fuzzy Hash: 38eaeb23fb88a4f4eec0de346e90d652ca85c744b6c391e02b432fcefee57cb3
                                                                                    • Instruction Fuzzy Hash: 21318D72611B8486EB41CF26E4443DD77A0F748F98F584039AB490BBA5DF79C886CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$InvalidateUpdateWindow$CursorEventMouseTrack
                                                                                    • String ID:
                                                                                    • API String ID: 1598129390-0
                                                                                    • Opcode ID: 802e805989fa9d4c4a32bece14764307a2230e9df8b2b09ca72670b31ce017dd
                                                                                    • Instruction ID: 949cb897e6d9736c8290268a34c261f74a99af520b63d9f9da859e87e208ad99
                                                                                    • Opcode Fuzzy Hash: 802e805989fa9d4c4a32bece14764307a2230e9df8b2b09ca72670b31ce017dd
                                                                                    • Instruction Fuzzy Hash: E1314F7260468486EB52CF3AE5547DD77E0F788F88F484026EB894B679CF39C946CB90
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$TextWindowlstrlenwsprintf
                                                                                    • String ID: @$entry_%03d$last_entry
                                                                                    • API String ID: 1117576183-2027942737
                                                                                    • Opcode ID: 48a734eb831d4a926fa84141339b4d994ed079c3306510baa5842e080204d01d
                                                                                    • Instruction ID: 20367c67e7e0e347c9ea5ae8511fba4c3340f68be4988edafbc17f5fb6ca8904
                                                                                    • Opcode Fuzzy Hash: 48a734eb831d4a926fa84141339b4d994ed079c3306510baa5842e080204d01d
                                                                                    • Instruction Fuzzy Hash: 35316B72204A85A1EB31DFA2F4957DA73A1F78CBC0F841012EB8947A6ADF38C115CB84
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ClientCursorScreenState
                                                                                    • String ID:
                                                                                    • API String ID: 3260035165-0
                                                                                    • Opcode ID: a343c8b907ce01b40606f00f3a9d77aadc0a1782466dc752b0cf1a0f6d8135ae
                                                                                    • Instruction ID: c55825a72f766a07505aea3f532184b6208be2b27f5a7f4d0f0cdc84b4e8e52c
                                                                                    • Opcode Fuzzy Hash: a343c8b907ce01b40606f00f3a9d77aadc0a1782466dc752b0cf1a0f6d8135ae
                                                                                    • Instruction Fuzzy Hash: BB216A32604A4487E7518F36E8547AA73A0F78CF89F488011EB8A4BAB8DF7DC945CF40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 2178440468-0
                                                                                    • Opcode ID: fa389dbd0ff469c580dd02baa99d938c1ff7d63db430f8735c4fcb3ba0e5e364
                                                                                    • Instruction ID: 64377e77e092256bba4b0bf8dd6efe28a2cdfd72a8759b74ea15fe6f58fd8926
                                                                                    • Opcode Fuzzy Hash: fa389dbd0ff469c580dd02baa99d938c1ff7d63db430f8735c4fcb3ba0e5e364
                                                                                    • Instruction Fuzzy Hash: C7213576700B8193E718CB72E984B9A73A0F78DB94F448121DB1A07F21DF35D0798340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Count$Info
                                                                                    • String ID: ?$H$d
                                                                                    • API String ID: 1536321054-264075452
                                                                                    • Opcode ID: 7a3e92aaea603efdefe6229bc4d6be2efc8871259700f46f410b9cef0d8ffbe3
                                                                                    • Instruction ID: 5eca7ed4276809b55e93e9ca8379de036a42334ab9fcc5bdd33d7e260f2269e4
                                                                                    • Opcode Fuzzy Hash: 7a3e92aaea603efdefe6229bc4d6be2efc8871259700f46f410b9cef0d8ffbe3
                                                                                    • Instruction Fuzzy Hash: E3014032204A8486E762CF62E9953DA72A1F78CBC8F444125EB8D4BB65DF7DC549CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ColorRect$ClientClipCopyText
                                                                                    • String ID:
                                                                                    • API String ID: 3037928153-0
                                                                                    • Opcode ID: 8f9e3595d1f24f89afdd309441a8681e8f0c67a4d7e7932a1e4881341db277d8
                                                                                    • Instruction ID: 8260f42f37f333a98bb1e8b9bc4db72a3e4eedd5c871235fd60e27b76e8a4575
                                                                                    • Opcode Fuzzy Hash: 8f9e3595d1f24f89afdd309441a8681e8f0c67a4d7e7932a1e4881341db277d8
                                                                                    • Instruction Fuzzy Hash: 4D5177766187908BD315CF1AA84479AFBA5F3D8B81F50411AFB8643B28DB7DD846CF00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendWindow$Capture$ReleaseShow$CursorRectVisible
                                                                                    • String ID:
                                                                                    • API String ID: 898369708-0
                                                                                    • Opcode ID: 9c36f5682363d8106458575818e2ac02bb8ebccf653df2b50aa808af24c2f18c
                                                                                    • Instruction ID: 9e7ededcd470cc7bf4384a777be597110a382e4ea636f7fee75998e3a344dd72
                                                                                    • Opcode Fuzzy Hash: 9c36f5682363d8106458575818e2ac02bb8ebccf653df2b50aa808af24c2f18c
                                                                                    • Instruction Fuzzy Hash: 89515B36604B8096EB618B62F4043DE72A4F388BC8F20452AFB8917BA5DF79C945CB45
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1912718029-0
                                                                                    • Opcode ID: bf99dca1336df69e9244f836b331ceaeb518d51efc0e3d7ef9c974df55cd5413
                                                                                    • Instruction ID: d7bd5abe59ac059ee7eff851a91fbfb4fc1a61cb37cfc273d06cbcdd0c71c80d
                                                                                    • Opcode Fuzzy Hash: bf99dca1336df69e9244f836b331ceaeb518d51efc0e3d7ef9c974df55cd5413
                                                                                    • Instruction Fuzzy Hash: 32313E76608B8486DA51DF66F88479AB7A0F38CBD4F940025EB8E47B65CF7DC485CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$LongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 312131281-0
                                                                                    • Opcode ID: 12d0f0d73ac8d2e3b61ed2c7a29258e4ce9088586d7d1f5a5a690189d225b3e2
                                                                                    • Instruction ID: 39fb874ae95ad9df0cd18ba223608d9a1f9d5846aaa8b884554e399c5500fca1
                                                                                    • Opcode Fuzzy Hash: 12d0f0d73ac8d2e3b61ed2c7a29258e4ce9088586d7d1f5a5a690189d225b3e2
                                                                                    • Instruction Fuzzy Hash: FA21BE71B1068182FB618BA3F845BDA2390E7CCBE5F589121AB0A4BEB4DE79C1418740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemTextWindow$Dialoglstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1317092535-0
                                                                                    • Opcode ID: a87151fa2057cafff4ff3c40a49fe09c4c87aec9be2fe003504239a4af3fa535
                                                                                    • Instruction ID: cdc34d9d0ca18f597bc0f2442e4f5c04772569c5d815cbb7c897c3705deea6ad
                                                                                    • Opcode Fuzzy Hash: a87151fa2057cafff4ff3c40a49fe09c4c87aec9be2fe003504239a4af3fa535
                                                                                    • Instruction Fuzzy Hash: 79212736605A9183EB52DF27E49435EA3A0F78CF80F444022EB8A8BB68CE39D5468740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$FindReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 359319186-0
                                                                                    • Opcode ID: 335af62c087f23680f868d21f8b268083a477dfa7f84046068a8233ea32e3cee
                                                                                    • Instruction ID: 555d2e7100eae8ecbc063fbf60d384ae605c5965ff4310db2ed006cd44cf6971
                                                                                    • Opcode Fuzzy Hash: 335af62c087f23680f868d21f8b268083a477dfa7f84046068a8233ea32e3cee
                                                                                    • Instruction Fuzzy Hash: AF113D75300B408AEB4ADF72E84935A76A1F78CFC1F188129EF4A4BB65DF3AD8118744
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$FindReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 359319186-0
                                                                                    • Opcode ID: b12ce51487e56afd0b3dbcd9719e3b41cdc7e025723370b1946c30d8a801cd06
                                                                                    • Instruction ID: 32313d7738bb70db4353e7da33688b8d3e54c674ab3359cd1800ddaf45387ef1
                                                                                    • Opcode Fuzzy Hash: b12ce51487e56afd0b3dbcd9719e3b41cdc7e025723370b1946c30d8a801cd06
                                                                                    • Instruction Fuzzy Hash: C9113D753016408BEB49DF22E80539976A1F78CFC1F188139EF4A4B765DF39D8018744
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientScreen$MoveParentWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2420994850-0
                                                                                    • Opcode ID: 1f98c295c3b08c56dcbf839a4a4d2b88b824048dac41c1f21ebf9688380bf2dc
                                                                                    • Instruction ID: 7f329799f33bd3262adc9ebb96557a10ded11004f7850d3629f50e521894eeb0
                                                                                    • Opcode Fuzzy Hash: 1f98c295c3b08c56dcbf839a4a4d2b88b824048dac41c1f21ebf9688380bf2dc
                                                                                    • Instruction Fuzzy Hash: E6115C76316B418AEA51DF26E84479DB760FB88BC4F045511EB8A4BB28EF3DC455CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FocusKillShowTimerWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3044290596-0
                                                                                    • Opcode ID: 8621990ddfdd798133131d01057765c320258a9855b5f303c8fe18765cb774f9
                                                                                    • Instruction ID: 2b9b25263dbd1fb5fa7c94dd138958bca2446ae866684a869933d9ca086554c2
                                                                                    • Opcode Fuzzy Hash: 8621990ddfdd798133131d01057765c320258a9855b5f303c8fe18765cb774f9
                                                                                    • Instruction Fuzzy Hash: D5015E31705A8092EB86C76BE5543EE6261F7DCBC1F0840259B494BA70CF3CC9D2C340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSendShow$CaptureReleaseVisible
                                                                                    • String ID:
                                                                                    • API String ID: 3175066377-0
                                                                                    • Opcode ID: ce0e83a03ec4ee1dd4523d9e77da799b9ee6c93cae91b3f4803d904d8190cee2
                                                                                    • Instruction ID: 16d2b01de5cf0ce976be5311fdb5b58e5e045f856cc25ec0490923595423f03d
                                                                                    • Opcode Fuzzy Hash: ce0e83a03ec4ee1dd4523d9e77da799b9ee6c93cae91b3f4803d904d8190cee2
                                                                                    • Instruction Fuzzy Hash: 5B01FB7170164582F7969F73E8587E92361EB8CF96F4880368B0A5F665CF39C9868350
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ByteCharInfoItemMenuMultiWide
                                                                                    • String ID: $0$H$MENU_2017
                                                                                    • API String ID: 3110664725-3967075016
                                                                                    • Opcode ID: 8e81b88c14c24131ab1970799924c347965d24fb70a2d45b9b1259aab2ef4ff1
                                                                                    • Instruction ID: 814d161aec673e9a6ab83f971220734419c78d4361167942e45194d01dc9a85f
                                                                                    • Opcode Fuzzy Hash: 8e81b88c14c24131ab1970799924c347965d24fb70a2d45b9b1259aab2ef4ff1
                                                                                    • Instruction Fuzzy Hash: 76D1617330598182EB62CB2AE8517DA6360FB89BB4F444311B7BD879E6DF78C585CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: DebugOutputString
                                                                                    • String ID: >>>>>>>>>>>>>>>>>>>>>>>>:$audio$image$video
                                                                                    • API String ID: 1166629820-85831261
                                                                                    • Opcode ID: 89fbec7ecaf396ec757d79277fa80d567e2ed32d2e822b1b38b77f2b79e6fa56
                                                                                    • Instruction ID: 4ea4c7d9c971c157d1c39f83fbb9d670df84a9e1285380ed96d5ec2a79abadac
                                                                                    • Opcode Fuzzy Hash: 89fbec7ecaf396ec757d79277fa80d567e2ed32d2e822b1b38b77f2b79e6fa56
                                                                                    • Instruction Fuzzy Hash: FFC14FB3201A8086EA62DB2AE4913DE73A1F7897B4F144312B779576F6CF38D885C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ActiveWindow_cwprintf_s_llstrlen$ByteCharMessageMultiPrivateProfileWide
                                                                                    • String ID: Lizenz$Lizenz
                                                                                    • API String ID: 391245238-3383787514
                                                                                    • Opcode ID: 628e5b16bab049e6997546dd1029402422e97129fc60ff241b007c050ef05ba6
                                                                                    • Instruction ID: e852d2016f22db00871252161425d8d185331b9801793e0a7a8e9bb15f26c547
                                                                                    • Opcode Fuzzy Hash: 628e5b16bab049e6997546dd1029402422e97129fc60ff241b007c050ef05ba6
                                                                                    • Instruction Fuzzy Hash: 4661727231198182EA63DB67E8517E963A1FB89BB0F440312BB79876F5DF38C945CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CompareString$lstrlen
                                                                                    • String ID: </A>$<A>
                                                                                    • API String ID: 1657112622-2122467442
                                                                                    • Opcode ID: f1ae98306a0dc4d9a198098ee93d0280e83c32c987eb90ee134b27f4caac6ae2
                                                                                    • Instruction ID: a16723b432ad62851a6586a46339e6a28edab238c7e60eb586aea2c4c25c0ee0
                                                                                    • Opcode Fuzzy Hash: f1ae98306a0dc4d9a198098ee93d0280e83c32c987eb90ee134b27f4caac6ae2
                                                                                    • Instruction Fuzzy Hash: 81417C72A04B84C9EB25CF2AE8447E9BBA4F798F84F558115DB8C83768EF38D446C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$wsprintf$lstrlen
                                                                                    • String ID: entry_%03d
                                                                                    • API String ID: 3434472813-2287328738
                                                                                    • Opcode ID: 26b86d3896f9feefeeda562d8e09b7ead3a32d8b3692815a9f317978bf79a396
                                                                                    • Instruction ID: b717c8b35cd5727ca2a66aa291fbfd0401708055774c6d90922703a28f774ded
                                                                                    • Opcode Fuzzy Hash: 26b86d3896f9feefeeda562d8e09b7ead3a32d8b3692815a9f317978bf79a396
                                                                                    • Instruction Fuzzy Hash: D3216F71714A8591E721DB62F8957DA63A1F78CBC4F845021EB8D47E6ADF3CC606CB80
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$CreateDeleteOpen
                                                                                    • String ID: Q-Dir-Admin-Test
                                                                                    • API String ID: 2517957394-3722092558
                                                                                    • Opcode ID: fa309d441f328594c4a57fcd27547200bf35728bb60ff2fe9e7224a57156d17a
                                                                                    • Instruction ID: 87b703af280292c386fa99309ddd0cbb0e8fddd641967dc40ad9411048e722ac
                                                                                    • Opcode Fuzzy Hash: fa309d441f328594c4a57fcd27547200bf35728bb60ff2fe9e7224a57156d17a
                                                                                    • Instruction Fuzzy Hash: 2C212B32614A9082EB52CB16F85439973E5F78CFD0F680112EB9947BA4CF7AC985CB80
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$lstrlen
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 1172434978-1545510068
                                                                                    • Opcode ID: 1601c8e892db72aa0a1cf2bf1ea9bc19a7191a27e1eb105fa9045aeaef51daeb
                                                                                    • Instruction ID: ddbfc51c3a79b05a2869253fabb33f1850f7458376bc7d084a722858f95e90de
                                                                                    • Opcode Fuzzy Hash: 1601c8e892db72aa0a1cf2bf1ea9bc19a7191a27e1eb105fa9045aeaef51daeb
                                                                                    • Instruction Fuzzy Hash: 4321813231464082E7619B3AE44439A77A0E7C9BA4F548315E7A987AF9CF38C556CF44
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenValuelstrlen
                                                                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                                                                    • API String ID: 2964171075-3913687870
                                                                                    • Opcode ID: 7c50986e9f4b8f3e8bd8faefeb71720e6021442e1d482e1be689d0675f62ecc8
                                                                                    • Instruction ID: 5cfe4bb5abde329db52458d4a005f69208c2917290fcb5ade1d3e3645eb3a88a
                                                                                    • Opcode Fuzzy Hash: 7c50986e9f4b8f3e8bd8faefeb71720e6021442e1d482e1be689d0675f62ecc8
                                                                                    • Instruction Fuzzy Hash: 48014C76214B5087DB109F66E84039DBBA1F788FE0F594621EF8947B68CF39C54ACB44
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: IsThemeActive$UxTheme.dll
                                                                                    • API String ID: 145871493-3611418440
                                                                                    • Opcode ID: 908373fd2877a7542c0fe83e044299c2c99612ad8c6aa36e03c116ce3a162b6c
                                                                                    • Instruction ID: de9107f110dc6e1ef5aef7b735d2bc255ab8f3378797630c10079203d58b98cd
                                                                                    • Opcode Fuzzy Hash: 908373fd2877a7542c0fe83e044299c2c99612ad8c6aa36e03c116ce3a162b6c
                                                                                    • Instruction Fuzzy Hash: AC018F31B0165086E751DF67B8803A673E0F70CF94F880929FB5A877B4CB38C8819B00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientDeleteRectRelease
                                                                                    • String ID:
                                                                                    • API String ID: 2015589292-3916222277
                                                                                    • Opcode ID: b84018bee03d18d6e97db581ce38ac2242b1c3bacfb9994da0e698130dd945ce
                                                                                    • Instruction ID: 7cd606f413cf8c21f9ea87088eab4501500ebd18866ac3de96a94ce5da873c8f
                                                                                    • Opcode Fuzzy Hash: b84018bee03d18d6e97db581ce38ac2242b1c3bacfb9994da0e698130dd945ce
                                                                                    • Instruction Fuzzy Hash: 28012D76218A80C6D7118F26E54836EB7A1F788FE9F144115EF8947B28CB7DC889CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: EnableThemeDialogTexture$UxTheme.dll
                                                                                    • API String ID: 145871493-3190584797
                                                                                    • Opcode ID: 34f173713268b76265d243d26936bb18781a0dd01399a9456a214fb2d26c225c
                                                                                    • Instruction ID: f56c2b9d72aac4315c18d815eab8db19e53424442d43405e60542a7c232650f8
                                                                                    • Opcode Fuzzy Hash: 34f173713268b76265d243d26936bb18781a0dd01399a9456a214fb2d26c225c
                                                                                    • Instruction Fuzzy Hash: 48E0C970711A4181EE869B63F9557A523A1EB8CFC0F4C64249E5A0B774EE39C994C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCurrentHandleModuleProcProcess
                                                                                    • String ID: IsWow64Process$kernel32
                                                                                    • API String ID: 4190356694-3789238822
                                                                                    • Opcode ID: ccada01f8b32241bef24b644c24404add471177c14a0d24d1d61a43f5af79063
                                                                                    • Instruction ID: 70c19d9519b70ab8798b5845d989e8cd7bb5b3e93dd8160c8ad995d837fd7981
                                                                                    • Opcode Fuzzy Hash: ccada01f8b32241bef24b644c24404add471177c14a0d24d1d61a43f5af79063
                                                                                    • Instruction Fuzzy Hash: E2E0C274626B4183EA46EB26EC8479933A4FB4CB85F841014EA0E07374EF3DC14ACB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$#161#162EnterFileLeaveModuleName
                                                                                    • String ID:
                                                                                    • API String ID: 2971530505-0
                                                                                    • Opcode ID: 690f21a3e1845385bcaf53a61c12f3dc099acad6d1dcaefb814ef141a452e445
                                                                                    • Instruction ID: a25afa92f56d2209929bf59a66b26f0a43651612561abbed378a00cff9f07290
                                                                                    • Opcode Fuzzy Hash: 690f21a3e1845385bcaf53a61c12f3dc099acad6d1dcaefb814ef141a452e445
                                                                                    • Instruction Fuzzy Hash: 8A613E32205B4086EB66CB2AE4903AD77B1F788FD4F644125EF594B6B8DF3ACA45C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Destroy$LongRedraw$AcceleratorTable
                                                                                    • String ID:
                                                                                    • API String ID: 3281180885-0
                                                                                    • Opcode ID: 280645d32c9fc4c27c3d3ff831acddb7af44f93bf84960ef5978e0be93ad8e71
                                                                                    • Instruction ID: 69f05dee8efd94aa638988ec922dfefb139b10ce20c02c48992fdc72880c37e0
                                                                                    • Opcode Fuzzy Hash: 280645d32c9fc4c27c3d3ff831acddb7af44f93bf84960ef5978e0be93ad8e71
                                                                                    • Instruction Fuzzy Hash: 7331A132B04A5085FB629B77D8413ED3270BB9ABE4F584115EF5A4BAE9DF36C582C340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$RectWindow$ClientScreen
                                                                                    • String ID:
                                                                                    • API String ID: 2198136683-0
                                                                                    • Opcode ID: 25aae191ebed58256dedb4c8005e7a6a9c56e7cefbce6b6ef52f19e44207613b
                                                                                    • Instruction ID: 625f7a3db415114be2c7c946a1617b858740bbf1a3ad8bb013b25d59d0c9dcbb
                                                                                    • Opcode Fuzzy Hash: 25aae191ebed58256dedb4c8005e7a6a9c56e7cefbce6b6ef52f19e44207613b
                                                                                    • Instruction Fuzzy Hash: 3D419076210B8086EB419F22E4447ED7360F788FC9F888029EF090B7A5CF78C949C751
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemText$Window
                                                                                    • String ID:
                                                                                    • API String ID: 2802354418-0
                                                                                    • Opcode ID: a594adfbb520d1e042016f0e6dc4fa538fe7353b5541c58799b67476dee03054
                                                                                    • Instruction ID: b634ca63e069e3e971be17b39d32aaa82f392764d4f4bf4a7909ee36b2a31c6b
                                                                                    • Opcode Fuzzy Hash: a594adfbb520d1e042016f0e6dc4fa538fe7353b5541c58799b67476dee03054
                                                                                    • Instruction Fuzzy Hash: 0D31617270094183EA41DB7BD8113996361EB88BF0F184321AB7D877E5DF3DC8828751
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$ItemSend
                                                                                    • String ID:
                                                                                    • API String ID: 950433545-0
                                                                                    • Opcode ID: 6e43536db41890a5825e03dcb4903996deabe10d9ec55dcb28b7f51d9de9cb92
                                                                                    • Instruction ID: 7bca7bfb517bbd07c9e830d1f50b30bb9cf377672a3dcc04f259e63f8db61dda
                                                                                    • Opcode Fuzzy Hash: 6e43536db41890a5825e03dcb4903996deabe10d9ec55dcb28b7f51d9de9cb92
                                                                                    • Instruction Fuzzy Hash: 00319F3271098083EB619B3AE86439A7360FBC9BF0F544311AB7A8BAF5DF79C4518740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Focus$ChildWindow
                                                                                    • String ID:
                                                                                    • API String ID: 501040988-0
                                                                                    • Opcode ID: 2669ce6f154819341a29bbc97dbade08fc2acc40a1aae060a0b4eb754087abf5
                                                                                    • Instruction ID: bfaa4b68dd51fa5ad69d427633385faf4ef39b43638e56a6b71d6b7b69afc303
                                                                                    • Opcode Fuzzy Hash: 2669ce6f154819341a29bbc97dbade08fc2acc40a1aae060a0b4eb754087abf5
                                                                                    • Instruction Fuzzy Hash: 28312B32205B8486EB95CF6AD4587D973B0F788F99F088625DB9D4B7A4CF3AC449CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderFromItemListLocationPathSpecialTextWindowwsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 3259017916-0
                                                                                    • Opcode ID: b337608be67815e1f882543b53302fc6b7cb76a9cbfcc451b9fed8b6dfe20f4a
                                                                                    • Instruction ID: bfd92be44cf0351dca82a94b62c2d325711ab0d382a8b8545932bfc03b26e6e2
                                                                                    • Opcode Fuzzy Hash: b337608be67815e1f882543b53302fc6b7cb76a9cbfcc451b9fed8b6dfe20f4a
                                                                                    • Instruction Fuzzy Hash: C3215E72214A8592EA15DB22E4943EA6361F7CCFC5F4880219F8D0BB69CF3CC14ACB80
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LineObject$DeleteRectSelect$ClientClipColorCreateIntersectMessageMoveParentSend
                                                                                    • String ID:
                                                                                    • API String ID: 640795467-0
                                                                                    • Opcode ID: 8abdaa05f8489e53c2f73c3562a215e7ab2baa942873b570995f9dff90c38e61
                                                                                    • Instruction ID: 5038d5b4792f7b22fca29c3999077a22cbaf7a2f18104be4f42bbff3053623b0
                                                                                    • Opcode Fuzzy Hash: 8abdaa05f8489e53c2f73c3562a215e7ab2baa942873b570995f9dff90c38e61
                                                                                    • Instruction Fuzzy Hash: 0821E5726286848ADB918F26F44079AB7B0F7C8B84F049116EF8A87B28DF79C445CF40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AsyncState$FocusMessageSendShowWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3327096832-0
                                                                                    • Opcode ID: 5f866e217674990f0777899df403e4e448b59f894e4c893b9b520a52e3229b59
                                                                                    • Instruction ID: fe49c99cfa19325b68a893d8f7872c518b3e05df83aafa69b7cd2fa17d13bb67
                                                                                    • Opcode Fuzzy Hash: 5f866e217674990f0777899df403e4e448b59f894e4c893b9b520a52e3229b59
                                                                                    • Instruction Fuzzy Hash: FB115131700681C2FB6A9B23E55439973A1F7ACBD1F444822EB464BAB4CFB9C8D1C780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window
                                                                                    • String ID:
                                                                                    • API String ID: 2326795674-0
                                                                                    • Opcode ID: 5271574c828254bc2fb153a96e3a34bcbde8accf79d5c1475769f08ac4ca33aa
                                                                                    • Instruction ID: 7f1d6115c0fc46552c443e6366ab1eb2d2bd81526d3f9c9a880eedcc8480a8b6
                                                                                    • Opcode Fuzzy Hash: 5271574c828254bc2fb153a96e3a34bcbde8accf79d5c1475769f08ac4ca33aa
                                                                                    • Instruction Fuzzy Hash: C3117C7272468087E7218F62F859B9A77B0F3C9B9AF144011EB894BE18CB3DC5508F04
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: efb0df76017d4c17dd09bcb5af510510d325fa0b52017d4f83d20dd3488b4872
                                                                                    • Instruction ID: a9d85750d5e182a9d3a4b2647fb052577f188aba24419e61fa361592b93b4448
                                                                                    • Opcode Fuzzy Hash: efb0df76017d4c17dd09bcb5af510510d325fa0b52017d4f83d20dd3488b4872
                                                                                    • Instruction Fuzzy Hash: E411423531454582FB529F72E825BDA33A1E78DF89F485021EF090FEA5CE3AC545CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: #155
                                                                                    • String ID:
                                                                                    • API String ID: 1122522878-0
                                                                                    • Opcode ID: 9a32cc60d28c6435935e3f868d0b0a818da1d710b44b85fc901688fecaf1c201
                                                                                    • Instruction ID: da2093146b1d4883f13c63bd912c2f832ea7c315c3b51f47c1b6f2bbca3d1f38
                                                                                    • Opcode Fuzzy Hash: 9a32cc60d28c6435935e3f868d0b0a818da1d710b44b85fc901688fecaf1c201
                                                                                    • Instruction Fuzzy Hash: 62014F31606B4582EB9A8B23E5943A963A0BB5DFC4F084020EF0A0B778EF3DC4658340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInfoMallocMessageSend
                                                                                    • String ID: '$ftp://
                                                                                    • API String ID: 2720085397-2224211471
                                                                                    • Opcode ID: b6ef2afb53ec975224ac763cd79f9719379ac8e05474e69a604d13932f95c70a
                                                                                    • Instruction ID: 9e87be585b3c4869394aaa91d6377e58f1872d871267d8a4f42fb31f4084679d
                                                                                    • Opcode Fuzzy Hash: b6ef2afb53ec975224ac763cd79f9719379ac8e05474e69a604d13932f95c70a
                                                                                    • Instruction Fuzzy Hash: 68B15332255AC181EB62DB26E4947DEB360F7887E4F444326A7AD47AF9DF78C845CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timelstrlentime
                                                                                    • String ID: Start$chk_ini
                                                                                    • API String ID: 1894013882-2223941635
                                                                                    • Opcode ID: 0910d0cb727912416846f1174ea37008d238004550ec1db09e7153c98418481c
                                                                                    • Instruction ID: 94e55ab4f76687b738f5f610a6ec0209f5c1f17635defe9a180fb0e4e79d6394
                                                                                    • Opcode Fuzzy Hash: 0910d0cb727912416846f1174ea37008d238004550ec1db09e7153c98418481c
                                                                                    • Instruction Fuzzy Hash: DD416D32300A4182EA629F7BE8513DA73A0F788BF4F154725A779876F5DF39C5458B00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInfoMessageSendlstrlen
                                                                                    • String ID: 7
                                                                                    • API String ID: 1791443542-1790921346
                                                                                    • Opcode ID: fd089fbe94b865a4ff175553e115fef7a51f2bc2555e8dd100df362627659a02
                                                                                    • Instruction ID: d8490fb1d67b395f664c64d04c705b151f0ec587bd65ca41e6f578b32846002c
                                                                                    • Opcode Fuzzy Hash: fd089fbe94b865a4ff175553e115fef7a51f2bc2555e8dd100df362627659a02
                                                                                    • Instruction Fuzzy Hash: 5B41B332214A8082E762DB26E8417DA73A1F7CCBA0F444225BB5E4BAE5DF3CC445CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$PostQuitlstrlen
                                                                                    • String ID: -install -nolisense$DIR (error):
                                                                                    • API String ID: 3530804915-3378501890
                                                                                    • Opcode ID: da9d2116cc6d976f98589fa54ca457e95707e8747e53270dfad2b62e2fa2f9a8
                                                                                    • Instruction ID: 02d7fa17c24a308701276c9fe8fa7bfc21bf2d42b33da7dad155f12c4e7e3459
                                                                                    • Opcode Fuzzy Hash: da9d2116cc6d976f98589fa54ca457e95707e8747e53270dfad2b62e2fa2f9a8
                                                                                    • Instruction Fuzzy Hash: 8941937234098082E662DB7AE8553EA2391F78C7F0F144701AB3D976E2DF3DD8859B01
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ByteCharMultiWide$lstrcpyn
                                                                                    • String ID: xxA
                                                                                    • API String ID: 3533429210-1134453250
                                                                                    • Opcode ID: c9b13b3b49ae3a0fe1a40338baec8b2d82f1397cac2e77cee96e721580689359
                                                                                    • Instruction ID: a547eeaf1373a3928091a96cb44de3c9cb1a2777885c000a75fc5d867d7c1398
                                                                                    • Opcode Fuzzy Hash: c9b13b3b49ae3a0fe1a40338baec8b2d82f1397cac2e77cee96e721580689359
                                                                                    • Instruction Fuzzy Hash: FC315B32610B8085DB11DF26E8447DA77A1F74CBA8F884326AB6A4BBE6DF38C5548740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExecuteFileModuleNameShelllstrlen
                                                                                    • String ID: -install -runas $runas
                                                                                    • API String ID: 1911922327-3929630117
                                                                                    • Opcode ID: bae3965100ca9b4d2d0ec7dbf4dbf3a6776746e7f2184b68808a97797d12ec14
                                                                                    • Instruction ID: 2e156fb82ac7297d941c920cfff97abb80f607fa0f8022e121350240a9254d8e
                                                                                    • Opcode Fuzzy Hash: bae3965100ca9b4d2d0ec7dbf4dbf3a6776746e7f2184b68808a97797d12ec14
                                                                                    • Instruction Fuzzy Hash: F8415E72205A8082EB62DB2AE8953EA73A0F789BB4F544312A77D476F5DF78C5418B40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassCreateRegisterWindow
                                                                                    • String ID: P$statis_dum_iii
                                                                                    • API String ID: 3469048531-1313065383
                                                                                    • Opcode ID: 7204a8fc8213da2249f4636d29afe0a13662ff5a4b7e30aacd79e94bcc40acda
                                                                                    • Instruction ID: 0e978ea9e3005acd3e133d29108afae009959e9db712d3859dcc4d955e5486f4
                                                                                    • Opcode Fuzzy Hash: 7204a8fc8213da2249f4636d29afe0a13662ff5a4b7e30aacd79e94bcc40acda
                                                                                    • Instruction Fuzzy Hash: 02311972218B848AD750CF11F84838EB7B8F348B80FA5412AEB9C47724CF7AD965CB44
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: QISearch$SHLWAPI.DLL
                                                                                    • API String ID: 2574300362-4145147620
                                                                                    • Opcode ID: 024a2e34a9e16ffaf39e3ee9d7162d9bb1e6c21d7cf10d2e7c5e60dc774e91dc
                                                                                    • Instruction ID: ab2e1c7d4fd7b7f29266dee46f7ffa0049422a4993816f206347337d25c21c3c
                                                                                    • Opcode Fuzzy Hash: 024a2e34a9e16ffaf39e3ee9d7162d9bb1e6c21d7cf10d2e7c5e60dc774e91dc
                                                                                    • Instruction Fuzzy Hash: 80011274206B4481EA9ACB17B84079A63A0BB5CFC0F488426EF5D07778EF3CC458C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHCreateItemFromIDList$shell32.dll
                                                                                    • API String ID: 2574300362-1230108373
                                                                                    • Opcode ID: 55f173ef94ab55738991bd415ffd65b7ca69e7955fa855aaca1ef78abd096189
                                                                                    • Instruction ID: 3ec731725c5976e047d5f3ed11543dc33774e5eb01105c34f16c41895327d7f4
                                                                                    • Opcode Fuzzy Hash: 55f173ef94ab55738991bd415ffd65b7ca69e7955fa855aaca1ef78abd096189
                                                                                    • Instruction Fuzzy Hash: 90012C34306B4180FE6ACB17B8643E522A4BB4CBD0F484539AF0E0BB74EF78C5429344
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHAutoComplete$SHLWAPI.DLL
                                                                                    • API String ID: 2574300362-1962728933
                                                                                    • Opcode ID: 91fbb4a9fa89c319b7572ef584f78a7a01c34eab096ff84b722d1c6fe429b0da
                                                                                    • Instruction ID: 9c84f83e5ba2447c17645bfe4ecb8d1c6c0cccc2d12660ec6964ceba05baf484
                                                                                    • Opcode Fuzzy Hash: 91fbb4a9fa89c319b7572ef584f78a7a01c34eab096ff84b722d1c6fe429b0da
                                                                                    • Instruction Fuzzy Hash: E1F03C31315A5081EB96DF57F9803EA62A1A78CBC0F984935EB5A47BB8DF78C9958300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHAutoComplete$SHLWAPI.DLL
                                                                                    • API String ID: 2574300362-1962728933
                                                                                    • Opcode ID: 1fce9783a230938123d34a771df2d9e771897002ef47b020f12f1327e121a8b2
                                                                                    • Instruction ID: fed27306617197554a2f73ec955ba6208234ef249cfd57f541c290223bed88eb
                                                                                    • Opcode Fuzzy Hash: 1fce9783a230938123d34a771df2d9e771897002ef47b020f12f1327e121a8b2
                                                                                    • Instruction Fuzzy Hash: F9F04F3131565082EA569B57F9C07AA23A0B74CFC0F8C9832DB5E4BB78DB78C8958344
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHGetPropertyStoreFromParsingName$shell32.dll
                                                                                    • API String ID: 2574300362-1006681335
                                                                                    • Opcode ID: d9b05ad3e55157e09f719d1eb70f3573b6e390ed23ebcb2909dd36dc982255a9
                                                                                    • Instruction ID: 92a53c9b2c6986d392c079306b9cab9ff1ccb880d0bf9384d9deb60e5bdf1e0c
                                                                                    • Opcode Fuzzy Hash: d9b05ad3e55157e09f719d1eb70f3573b6e390ed23ebcb2909dd36dc982255a9
                                                                                    • Instruction Fuzzy Hash: 80011275205B8085EA02DB13F84039AA3A0BB8CFD0F984525EF9D47B38EF78C5518680
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHGetPropertyStoreFromParsingName$shell32.dll
                                                                                    • API String ID: 2574300362-1006681335
                                                                                    • Opcode ID: e48e1507de48a4311fe272084056ca125e9c775215d8b2176caca9c43a3bb255
                                                                                    • Instruction ID: 8bd99dd649bbacec6d3eddf30d920764205e6e430a851636932afa8aede0e0a9
                                                                                    • Opcode Fuzzy Hash: e48e1507de48a4311fe272084056ca125e9c775215d8b2176caca9c43a3bb255
                                                                                    • Instruction Fuzzy Hash: C1011635609B8085EA02DB13F84079AA3A0AB8CFD0F584425EF9C47B78DF78C5558680
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: GdiplusStartup$gdiplus.dll
                                                                                    • API String ID: 2574300362-2859723088
                                                                                    • Opcode ID: 6b284fe02d542a2ce75dd6ef7befe24c2a921d87d8afc18bd5ca5d95d158839b
                                                                                    • Instruction ID: 02acb70657b7ce33846d5257c67c8b078a4d2101f609615c76177b8a4c57a85b
                                                                                    • Opcode Fuzzy Hash: 6b284fe02d542a2ce75dd6ef7befe24c2a921d87d8afc18bd5ca5d95d158839b
                                                                                    • Instruction Fuzzy Hash: 17014F73614B4082EB668F61F4543A973E0FB5CB88F4C4629AB9D0A7A8DF7CC658C744
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHCreateItemFromIDList$shell32.dll
                                                                                    • API String ID: 2574300362-1230108373
                                                                                    • Opcode ID: b134420dda41a678cf4efad9540bf980d1ee860ab89cf5841b3a577b61b047f8
                                                                                    • Instruction ID: 6ecaa34bf034c5b73901124b93beb4e4cad3f1f82d00e2624006f4f16cdb6e34
                                                                                    • Opcode Fuzzy Hash: b134420dda41a678cf4efad9540bf980d1ee860ab89cf5841b3a577b61b047f8
                                                                                    • Instruction Fuzzy Hash: C5011D34612B4081FE46D717B8547D523A0BB5CFD1F489125AB5E0BB74EF39C5918784
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHCreateItemFromIDList$shell32.dll
                                                                                    • API String ID: 2574300362-1230108373
                                                                                    • Opcode ID: a91374056d8a68bab526b41000e1498591f4dbb3c24734d4698b5937bf57ea7d
                                                                                    • Instruction ID: b8c87af924705db2950075d95956967bfee2869166edcb5ef87f549912d79088
                                                                                    • Opcode Fuzzy Hash: a91374056d8a68bab526b41000e1498591f4dbb3c24734d4698b5937bf57ea7d
                                                                                    • Instruction Fuzzy Hash: 220119B1606B8090EA46DB57B9843D962A1AB4CFD0F489025AF4D0BB79EF39C585C344
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: IUnknown_SetSite$SHLWAPI.DLL
                                                                                    • API String ID: 2574300362-510016731
                                                                                    • Opcode ID: 6064f585d60d4145410394664492ab82eb0897fb9772e554ece2b036209c83a3
                                                                                    • Instruction ID: 4f7f00e34cd4cc156fd306960ba262de995f3fe2bfab1153746e0823def66540
                                                                                    • Opcode Fuzzy Hash: 6064f585d60d4145410394664492ab82eb0897fb9772e554ece2b036209c83a3
                                                                                    • Instruction Fuzzy Hash: 4AF0ECB1702F4580EE56CB57B8407E522A0EB9EFD0F5840299F1E07BB8EB38C584C201
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SetMenuInfo$USER32.DLL
                                                                                    • API String ID: 2574300362-3329878150
                                                                                    • Opcode ID: 008186b0390a6044e1f810bfaacacc4cc893faade5d3a264c7b360f571ff4f8e
                                                                                    • Instruction ID: 5f6b0b84dccb0aeb09d1957f944bad3ef716bc03bd599b7d862f1e7eca1dbfcc
                                                                                    • Opcode Fuzzy Hash: 008186b0390a6044e1f810bfaacacc4cc893faade5d3a264c7b360f571ff4f8e
                                                                                    • Instruction Fuzzy Hash: 57016270316A4495EE9B8B57B9943A963B1AB4CFC4F88846BEA4E47774EF3DC8548300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: BrushColorCreateSolid
                                                                                    • String ID: $(
                                                                                    • API String ID: 2798526982-1539405979
                                                                                    • Opcode ID: 8bca26f666f68ddcab24edef733aa7cbd67f7eb763f99ad5e1c9ba8bd19d0f90
                                                                                    • Instruction ID: cc96462c3d3a73b8de1c9c82f96d7f4ec678fd16d64f8ff339f61ba97182009a
                                                                                    • Opcode Fuzzy Hash: 8bca26f666f68ddcab24edef733aa7cbd67f7eb763f99ad5e1c9ba8bd19d0f90
                                                                                    • Instruction Fuzzy Hash: F0F06D7231478482EB229B22F5453DDB3A1F78CB84F844129EB8D077AADF3DC5448B00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: PSGetPropertyDescription$Propsys.dll
                                                                                    • API String ID: 2574300362-1499179682
                                                                                    • Opcode ID: b89c33640890fbf125500b44bf15ad83a987c5a898db5bd3f9aff38a6f2d53d8
                                                                                    • Instruction ID: b237bd86a10ac946d9027bf34f8adbce9966be18b6110875eac743190c2b36a3
                                                                                    • Opcode Fuzzy Hash: b89c33640890fbf125500b44bf15ad83a987c5a898db5bd3f9aff38a6f2d53d8
                                                                                    • Instruction Fuzzy Hash: 0FF0F470715B8191EA56DB17F8503A662A0AB8CFD0F489525AE5D47778EF3CC645C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassNameParentlstrcmp
                                                                                    • String ID: #32770
                                                                                    • API String ID: 3513268407-463685578
                                                                                    • Opcode ID: 3ae7b716422dc3192f24f15b70690bc868262ec55aadb2eb93d50f21e9092d4c
                                                                                    • Instruction ID: e288a9f42ec0ff8e3952b93c68f4a1e9c458a99ced97bda2198b7ac34596bf18
                                                                                    • Opcode Fuzzy Hash: 3ae7b716422dc3192f24f15b70690bc868262ec55aadb2eb93d50f21e9092d4c
                                                                                    • Instruction Fuzzy Hash: EFF03071321A45C6EB519B62E89539923A0F74CBC9F941029DB4E8F274DE39C508C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SetWindowTheme$UxTheme.dll
                                                                                    • API String ID: 2574300362-2822173195
                                                                                    • Opcode ID: 6e0da49aacfabf357029b364a9a1c58496de4a0e89ac07912c19dfa8c451e8b4
                                                                                    • Instruction ID: 0731938fe58207dfb6702455b0e71ea80bed2a645dcd5936e3ac2dc96702abd7
                                                                                    • Opcode Fuzzy Hash: 6e0da49aacfabf357029b364a9a1c58496de4a0e89ac07912c19dfa8c451e8b4
                                                                                    • Instruction Fuzzy Hash: 13F01274711B8081EA5ADB53B99439673A0AB4DFD0F884465AE4E0BB78EF38C5858300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: PSGetPropertyKeyFromName$Propsys.dll
                                                                                    • API String ID: 2574300362-403519385
                                                                                    • Opcode ID: 25b940713112fac3b88c0b771f008fda2f6caf4df98c123291784805e4f36daa
                                                                                    • Instruction ID: 850ba38c66e9a2e065ece50cc029bf3dd29729e01e27b5fb1390d41547a6979d
                                                                                    • Opcode Fuzzy Hash: 25b940713112fac3b88c0b771f008fda2f6caf4df98c123291784805e4f36daa
                                                                                    • Instruction Fuzzy Hash: A1F0B2B0616A0584EE96DB17FD953A562A1AB8CFC0F984425EA5D4B374EF3DC498C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: PSGetNameFromPropertyKey$Propsys.dll
                                                                                    • API String ID: 2574300362-1696488721
                                                                                    • Opcode ID: a4f35da2b8e56bff98c90dbeb5046eba8ac5fdfa696bfe1025a91a155028939b
                                                                                    • Instruction ID: c995b99de344829539e21ee43e355361e437aa4a999d7b7e50af07b7260cbd82
                                                                                    • Opcode Fuzzy Hash: a4f35da2b8e56bff98c90dbeb5046eba8ac5fdfa696bfe1025a91a155028939b
                                                                                    • Instruction Fuzzy Hash: 7AF0B270206B4184FE9ADB57FD907A462A1AB9CFC0F584425EA0D8B374EF39C598C780
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AddressFreeProcUnlock
                                                                                    • String ID: GdipDisposeImage
                                                                                    • API String ID: 1533353642-3565980357
                                                                                    • Opcode ID: a4abbf6f368b430c10a21c962181fb2737ca6e8b6dafcfd9994dcd65e6a59665
                                                                                    • Instruction ID: d88b59f72e536f6f0b794206abc0cba7b427f7b5d53eb3b9d58d43c7f53d9297
                                                                                    • Opcode Fuzzy Hash: a4abbf6f368b430c10a21c962181fb2737ca6e8b6dafcfd9994dcd65e6a59665
                                                                                    • Instruction Fuzzy Hash: D3F0F47521264085FF569FB2D45536C2360EB9CF84F0D44258F090F264CF39C894C394
                                                                                    APIs
                                                                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,00000000,00000001401043E4), ref: 00000001400A4E53
                                                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,00000001401043E4), ref: 00000001400A4E6A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SHGetIDListFromObject$shell32.dll
                                                                                    • API String ID: 2574300362-2712335180
                                                                                    • Opcode ID: 40dbb2ef79c6063c65a361d138461b082569a00b6a2db35aa8723f8983a01e3f
                                                                                    • Instruction ID: 7db5ddfbe598e7274f233d8515b14e81639b748191d1b09f030b2e8b782c512c
                                                                                    • Opcode Fuzzy Hash: 40dbb2ef79c6063c65a361d138461b082569a00b6a2db35aa8723f8983a01e3f
                                                                                    • Instruction Fuzzy Hash: 39F01534712B4090EE56DB27F9843E562A1BBACFD4F4891249A1E4BB74EF78C4D48700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: SetProcessDPIAware$user32.dll
                                                                                    • API String ID: 2574300362-1137607222
                                                                                    • Opcode ID: 5b6d96cb6dbb1e847212dc029c4e773adc48d9993dbcc8fe46d1e707afd9163d
                                                                                    • Instruction ID: 493432112d8da6590dd3b1c40e2d49a572422a9c4a2a5c2a3ae0f7300becff1c
                                                                                    • Opcode Fuzzy Hash: 5b6d96cb6dbb1e847212dc029c4e773adc48d9993dbcc8fe46d1e707afd9163d
                                                                                    • Instruction Fuzzy Hash: 34E0EE30303B0090FE5B9B63AC603A922A0AF0DB94F88082C8B0D173B0EF39CA448280
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1c4be9195cc77cef775c8262ad6f01d72f4586bf9be56751ae816e588f1db10a
                                                                                    • Instruction ID: 8b70a3cb79fed4f23f4ea39d58610363a57c493864a3569b9f248fe61172f74f
                                                                                    • Opcode Fuzzy Hash: 1c4be9195cc77cef775c8262ad6f01d72f4586bf9be56751ae816e588f1db10a
                                                                                    • Instruction Fuzzy Hash: 45719E7130554055FA66EB63A8203EA6252AB9CFC4F48442AFF4E4BBF6EE78C945D700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: #190CreateInstancelstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 3519823768-0
                                                                                    • Opcode ID: d3aeede6cfb267e8cdacd3fe1e1a9851ceeea0070934e8b6aec0a834bf095e89
                                                                                    • Instruction ID: 4031ad1388f9cacfce5f3d757dc68f381943deca6c9ae25810f0c5bb8013c0af
                                                                                    • Opcode Fuzzy Hash: d3aeede6cfb267e8cdacd3fe1e1a9851ceeea0070934e8b6aec0a834bf095e89
                                                                                    • Instruction Fuzzy Hash: 8B613636300A80C6EB55AF2AD89139D7761F789FA4F548225EB2E8B7E4DF39C845C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 51ceb622f80d42db67fe6a6f522834c050ab0093bd0d86a59864c8b844b44a3a
                                                                                    • Instruction ID: e724c0a393fb44e7d7fe32b0fe0895aa892e40907ff70938ef366399635737c4
                                                                                    • Opcode Fuzzy Hash: 51ceb622f80d42db67fe6a6f522834c050ab0093bd0d86a59864c8b844b44a3a
                                                                                    • Instruction Fuzzy Hash: 57518036314B4192EB66AF26E4507AE63A0F78DBD5F444229FB4A4FBA4DF3DC5048B40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallItemMessageProcSendWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2540570209-0
                                                                                    • Opcode ID: 84c870a64cba01f113ea922496bd8dab1d48acb80a32e4bec21fc688e076341b
                                                                                    • Instruction ID: 6dd89c7723f76ef318bc3c75d1af482074e668c1e4c967f1e30e1c19cb29e322
                                                                                    • Opcode Fuzzy Hash: 84c870a64cba01f113ea922496bd8dab1d48acb80a32e4bec21fc688e076341b
                                                                                    • Instruction Fuzzy Hash: 5A51083260169482EA66DA1BD584BED63F1E38CFC4F244456FB4D0BBA8CB76C882C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientRect$AcceleratorCreateParentTable
                                                                                    • String ID:
                                                                                    • API String ID: 2716292469-0
                                                                                    • Opcode ID: dde6dacba9a0fd88c2da3e85faeaa71228a4c03b5a5a80f5f4903a9e7cbb60fb
                                                                                    • Instruction ID: e9e3a129fd05a8c3afb600424b66cc8f3f5fc5f14f7970f0e15b79112e3d724d
                                                                                    • Opcode Fuzzy Hash: dde6dacba9a0fd88c2da3e85faeaa71228a4c03b5a5a80f5f4903a9e7cbb60fb
                                                                                    • Instruction Fuzzy Hash: 94412C32204E4582DB62CF26E59079DB3A1F788BD4F494112EB9A8BB74DF7AC485C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Text$MessageSendWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3469960932-0
                                                                                    • Opcode ID: ec640232d88d5050cf1fe10705205ef973f39af6ea08bf42701aadeb61a1a83d
                                                                                    • Instruction ID: 7f9063c28b5efc1fc8df8eeef4a294ff768a32359aff3d785d8a53f0f37903ad
                                                                                    • Opcode Fuzzy Hash: ec640232d88d5050cf1fe10705205ef973f39af6ea08bf42701aadeb61a1a83d
                                                                                    • Instruction Fuzzy Hash: 32416272315A8182EA62DB26E8513D973A0F7CDBE4F584221EB6D47BE5DF3CC9418B40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: e9c618750f7e9578091f6e8aa6e7481c5c0fc8e068f3fb0e563ea0cbc207b183
                                                                                    • Instruction ID: 4d5a6ef5ac5062a46ac362863f6712f742d6aee19744449d42b04f9158f65dc6
                                                                                    • Opcode Fuzzy Hash: e9c618750f7e9578091f6e8aa6e7481c5c0fc8e068f3fb0e563ea0cbc207b183
                                                                                    • Instruction Fuzzy Hash: B3313C32214B9586EB65CF62E800BCAB3A5F789F94F588026EF8D07B58CF39C545CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadStringlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1897449643-0
                                                                                    • Opcode ID: 457bd7444d0fc5994a8c104cdb6e2962a47c23aba82ab7f79dffde6ede849265
                                                                                    • Instruction ID: 3cd70586c1396cff09d75043366134b9b1ed1679a98ee94d3190c10c9813ca6e
                                                                                    • Opcode Fuzzy Hash: 457bd7444d0fc5994a8c104cdb6e2962a47c23aba82ab7f79dffde6ede849265
                                                                                    • Instruction Fuzzy Hash: 4131717230568045EB22EB27F8983EA62A0F7CCBC8F454135EF8E87765DA38C445C780
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bac78f750ec2e47ba6344a709ca526592b7416773e67249dee86739aa590f930
                                                                                    • Instruction ID: 7c83a08e8cf7d5c6799400a3feae95c4bb6c90063c94fd271dd9d7610a84688e
                                                                                    • Opcode Fuzzy Hash: bac78f750ec2e47ba6344a709ca526592b7416773e67249dee86739aa590f930
                                                                                    • Instruction Fuzzy Hash: 0B213C32340B4182EA559F57E8407AD66F0AB8CFC0F888025AF4E8F364DE3AD9558301
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ColorRect$ClientInflateLibraryLoad
                                                                                    • String ID:
                                                                                    • API String ID: 2668497441-0
                                                                                    • Opcode ID: ee54cd4c1953a957bb43c1b937c2af624417fde18b992d8604e50a31b5b21dc2
                                                                                    • Instruction ID: 621d7bfdc53ed731dfeb870418368c788bc9be0a4d45be09091ebdda6881bc4a
                                                                                    • Opcode Fuzzy Hash: ee54cd4c1953a957bb43c1b937c2af624417fde18b992d8604e50a31b5b21dc2
                                                                                    • Instruction Fuzzy Hash: 273193322186C087E711E779E49039EB7A0F7C9760F500226F7D6879F9DA7DC9458B50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window
                                                                                    • String ID:
                                                                                    • API String ID: 2353593579-0
                                                                                    • Opcode ID: 98d8c97723451eee5fa419887b154b15311763850bf29c52930ce66418f04811
                                                                                    • Instruction ID: 76e228422efc14ab171354e0e710eb4dd20a536a494ed9ee1e2266c35080bb6e
                                                                                    • Opcode Fuzzy Hash: 98d8c97723451eee5fa419887b154b15311763850bf29c52930ce66418f04811
                                                                                    • Instruction Fuzzy Hash: 72317F726146408BE761CF26E094BAEBBA0F7C8BA5F040125EB8947A68CB7CC549CF40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 02ee0a031452a712dcc5a9b6ccb9cc4f5df80136606332f29e6b9056247e12a8
                                                                                    • Instruction ID: f4b5b43e1dbcac641fd52aed1dc90abb487d34aedc2016f7dd9dbe00a17d074d
                                                                                    • Opcode Fuzzy Hash: 02ee0a031452a712dcc5a9b6ccb9cc4f5df80136606332f29e6b9056247e12a8
                                                                                    • Instruction Fuzzy Hash: 64214FB6304A5182E761CF23E8847DA7360F78CF84F5881219B898BB65CF39C986C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Namelstrlen$FileModulePathShort
                                                                                    • String ID:
                                                                                    • API String ID: 2246708160-0
                                                                                    • Opcode ID: c318728a733613225711cf00beb3823aa52db8ec8305aeff91280bd55fce9e73
                                                                                    • Instruction ID: 9d750c61145206b6431f2e875ec00702626ddf6a83599796569612e2fd9313bb
                                                                                    • Opcode Fuzzy Hash: c318728a733613225711cf00beb3823aa52db8ec8305aeff91280bd55fce9e73
                                                                                    • Instruction Fuzzy Hash: 45216D71318A8082EB21DB12E9843DA63A0F78DBD4F444225EB9D47BB9DF3DC4458B40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$TextWindowlstrcpy
                                                                                    • String ID:
                                                                                    • API String ID: 3464547807-0
                                                                                    • Opcode ID: db62b39b4671f13d4572fde29e556102d66c5e290e4090359d6da12b4e4a19fc
                                                                                    • Instruction ID: c0fc1cc7a5d8f3d75b9a2797b5c5bd133a69d83c8b481480aec860af552f8b6a
                                                                                    • Opcode Fuzzy Hash: db62b39b4671f13d4572fde29e556102d66c5e290e4090359d6da12b4e4a19fc
                                                                                    • Instruction Fuzzy Hash: A1112B71205A4081EA25DB26B9543A96761FB8CFE5F044724AFAA0B7F9DF39C442C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 5e0b2b3ef8a332cd8a7ab54ce314edbc5ef82c1d537879b0ecb036aee84a5ce1
                                                                                    • Instruction ID: fb0259056f7ffb6e2bebaff3f708ff68a1dbf888c46a5553fee308fd95b503aa
                                                                                    • Opcode Fuzzy Hash: 5e0b2b3ef8a332cd8a7ab54ce314edbc5ef82c1d537879b0ecb036aee84a5ce1
                                                                                    • Instruction Fuzzy Hash: 31015E3230068082FB958B76E854BEA3311E7CCFD9F599031AF154BEA5CE38C8868700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$MessageSend$CreateErrorFolderLastLocationParentSpecial
                                                                                    • String ID:
                                                                                    • API String ID: 127071798-0
                                                                                    • Opcode ID: 31d0594e58dac9dbcf91257bd07bd6adf73933fdf4610d401216bfd29f03893a
                                                                                    • Instruction ID: e840238b4ca7c3278d7244374dd0ad3c6c885b7f1ffa2557ae340cb135501bd2
                                                                                    • Opcode Fuzzy Hash: 31d0594e58dac9dbcf91257bd07bd6adf73933fdf4610d401216bfd29f03893a
                                                                                    • Instruction Fuzzy Hash: 6C017125310A5082E7619B37E840B9DA261EBCDBE4F584215EF9987BB9DF35C8408A50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: c7720ca7e7c40b996d3996fa9c523e65bfa02980a4f1ce7d30cdc8fcfbe39b0b
                                                                                    • Instruction ID: 1753b21ec4ce3c16ece94459741227543a9f819e30e0fd13699a7feb37fece1f
                                                                                    • Opcode Fuzzy Hash: c7720ca7e7c40b996d3996fa9c523e65bfa02980a4f1ce7d30cdc8fcfbe39b0b
                                                                                    • Instruction Fuzzy Hash: 75014032308A8482EB618B66F45479AA360E78CFD8F188011AF8D47B68DE79C585DB10
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$ClientFillMessageParentSend
                                                                                    • String ID:
                                                                                    • API String ID: 425900729-0
                                                                                    • Opcode ID: 246426f802778b43361a10255a9cf130cc92d45c8979f8c2c2d7b2e69a4a35bd
                                                                                    • Instruction ID: 65746bd96716ed5646d9c75bf0e47ac62e73171429ad31b6a0f415f318d6a1f8
                                                                                    • Opcode Fuzzy Hash: 246426f802778b43361a10255a9cf130cc92d45c8979f8c2c2d7b2e69a4a35bd
                                                                                    • Instruction Fuzzy Hash: 8801DA76604B8486DB518F26F44439AB7A0F78CBC5F188526EB8D47B28DF39C545CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AllocLockSizeUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 2086698462-0
                                                                                    • Opcode ID: 09c52875e877b2a5fc08a8396cdfbcce9c071e6894155dc83de6b17818f59550
                                                                                    • Instruction ID: d4e86e2ec7734a2390b9ac896b665349f28d54d72912de68fa70092b4f6f7785
                                                                                    • Opcode Fuzzy Hash: 09c52875e877b2a5fc08a8396cdfbcce9c071e6894155dc83de6b17818f59550
                                                                                    • Instruction Fuzzy Hash: C3F0F475705B9485DA459B63B94439A67A1F78DFD0F4C8434EF4A4BB29DE3CC0418740
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ByteCharMultiWide
                                                                                    • String ID: 0$Edit Path ;)
                                                                                    • API String ID: 477651035-1818000224
                                                                                    • Opcode ID: 8f265c33bc38ae585d8ce734efa95eedfd7aa536a2d69f8a7b000e511b4f5191
                                                                                    • Instruction ID: 92e8f7f46945e047ba99f33e5a88af4d362af239cfe9d9597c6b8eead95aa8c0
                                                                                    • Opcode Fuzzy Hash: 8f265c33bc38ae585d8ce734efa95eedfd7aa536a2d69f8a7b000e511b4f5191
                                                                                    • Instruction Fuzzy Hash: E7515271204A4081EA52DB2AE4943EA7361FB89BF4F544316BB7D476F6DF78C841C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindFocusWindow
                                                                                    • String ID: DirectUIHWND
                                                                                    • API String ID: 3177014434-3768200426
                                                                                    • Opcode ID: af27027bf0b43742ae8a5b907855fffb2ff0bb26dd53e08ee966ba0d9613169e
                                                                                    • Instruction ID: a4c3607e550bbc57b8f385f4c7907111bbb0e25a870caa10011de1781df032b7
                                                                                    • Opcode Fuzzy Hash: af27027bf0b43742ae8a5b907855fffb2ff0bb26dd53e08ee966ba0d9613169e
                                                                                    • Instruction Fuzzy Hash: C1310AB2314A4082EB15CF26E44439EB3A0F78DFD4F654922EB5D97AB4DF79C8848701
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$ActiveByteCharMessageMultiWideWindow
                                                                                    • String ID: string
                                                                                    • API String ID: 3708002346-2663297705
                                                                                    • Opcode ID: d3b270f3d0d7c18b11d2ecafb63ddc10f939fbd971c88585d1cd80db10c6d421
                                                                                    • Instruction ID: 0ef7e9c8ebfd1eb91094341b16459a694a545800eb2eece76a6eb6012339b009
                                                                                    • Opcode Fuzzy Hash: d3b270f3d0d7c18b11d2ecafb63ddc10f939fbd971c88585d1cd80db10c6d421
                                                                                    • Instruction Fuzzy Hash: 17111CB2311A4082EA51CB6FE8513997761FB89FF4F184315ABB9477F5DE79C4418700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: 0
                                                                                    • API String ID: 3850602802-4108050209
                                                                                    • Opcode ID: 2cd662d7ebf6fac9ccfca7c5517019c1845b6673797ba0c1b39958fbc234c6cb
                                                                                    • Instruction ID: 0edbeefc919d7124638846e930830738506a7f8c3ec3b61a7e0fdb640a844e4a
                                                                                    • Opcode Fuzzy Hash: 2cd662d7ebf6fac9ccfca7c5517019c1845b6673797ba0c1b39958fbc234c6cb
                                                                                    • Instruction Fuzzy Hash: 9F113A722096C486E722CB52E4543DAB7A1E7DDB99F484115EB880BB99CB7DC545CF00
                                                                                    APIs
                                                                                    • GetActiveWindow.USER32 ref: 000000014001CF95
                                                                                      • Part of subcall function 000000014005D980: GetUserDefaultLangID.KERNEL32 ref: 000000014005D99F
                                                                                      • Part of subcall function 000000014005D980: GetUserDefaultLangID.KERNEL32 ref: 000000014005D9B0
                                                                                      • Part of subcall function 00000001400860D4: GetModuleFileNameW.KERNEL32 ref: 000000014008613E
                                                                                      • Part of subcall function 0000000140085724: GetPrivateProfileIntW.KERNEL32 ref: 0000000140085755
                                                                                      • Part of subcall function 0000000140085724: _cwprintf_s_l.LIBCMT ref: 0000000140085776
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultLangUser$ActiveFileModuleNamePrivateProfileWindow_cwprintf_s_l
                                                                                    • String ID: Start$m_lang_id
                                                                                    • API String ID: 1238687741-533350618
                                                                                    • Opcode ID: 2a2ea8878e430e9ac9dc71f0c97e8a5866c6441867f495c8b97fb8444bc8db48
                                                                                    • Instruction ID: da8e90e005fe7cf686c9a8fcfee6dc250aeb8000f82de581d6aac4fa5f71f0f5
                                                                                    • Opcode Fuzzy Hash: 2a2ea8878e430e9ac9dc71f0c97e8a5866c6441867f495c8b97fb8444bc8db48
                                                                                    • Instruction Fuzzy Hash: 6D217C76225A8086EB21DF16F8447D973A0F78DBA4F540319A7584B6F5CB39C509CB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoItemMenulstrlen
                                                                                    • String ID: H
                                                                                    • API String ID: 2604594206-2852464175
                                                                                    • Opcode ID: 3726a0771b3acb710a45699ff882f1710b767f31d2be6f0e4be57d88078e9e2a
                                                                                    • Instruction ID: 0202e2bed6aeba79b1ae7b68283dc396e02056d69b16cd482c4d7361eb1521e2
                                                                                    • Opcode Fuzzy Hash: 3726a0771b3acb710a45699ff882f1710b767f31d2be6f0e4be57d88078e9e2a
                                                                                    • Instruction Fuzzy Hash: 3311907631468086E761EF16E444B9E7764F788BD4F108224EB9E077A4CF7EC85ACB40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeGlobalProc$LibraryUnlock
                                                                                    • String ID: GdiplusShutdown
                                                                                    • API String ID: 2219017130-872607806
                                                                                    • Opcode ID: 3833d9bc5ee760caa3d62aa1db2a19e64992e11c6dffeff9801e85034df3e130
                                                                                    • Instruction ID: 8548f661922bd977077a650ae9b9472497a7d73ec19d0179ce9b85231c86a647
                                                                                    • Opcode Fuzzy Hash: 3833d9bc5ee760caa3d62aa1db2a19e64992e11c6dffeff9801e85034df3e130
                                                                                    • Instruction Fuzzy Hash: 37F03932601A0182EB669B76C4943AC23A0EB8CF8CF090821DF194B2A4CF79C9948345
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcatlstrlen
                                                                                    • String ID: \
                                                                                    • API String ID: 1475610065-2967466578
                                                                                    • Opcode ID: a7dd1163c1630c191c56c47ffac60cb70d2431cff589c3d32520aff1fd3ab87d
                                                                                    • Instruction ID: ecf6c7978da347110ad2b5e241d0ebec3c100959b16b9d2e41529072d50f2383
                                                                                    • Opcode Fuzzy Hash: a7dd1163c1630c191c56c47ffac60cb70d2431cff589c3d32520aff1fd3ab87d
                                                                                    • Instruction Fuzzy Hash: 28D09E6061671481EB296BA7684979413B1AB5CBCAF4854248B170B274DA7980D98240
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000008.00000002.3107959397.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                    • Associated: 00000008.00000002.3107933158.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108131459.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108249371.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108324519.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    • Associated: 00000008.00000002.3108372149.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_8_2_140000000_lvHost_v4.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 1659193697-0
                                                                                    • Opcode ID: 2c91adfc4207df4da6370e711a4044172966fa88e970d98e7d5bd1eec2555210
                                                                                    • Instruction ID: 831c3a05420aad9251ac649fad6c53a27428b546b4ada271ac814e6292017296
                                                                                    • Opcode Fuzzy Hash: 2c91adfc4207df4da6370e711a4044172966fa88e970d98e7d5bd1eec2555210
                                                                                    • Instruction Fuzzy Hash: 88619172301A449ADE26DF67E9443E9A7A5F78CBC8F488521AB4A8B7B5DE3DC045C700